Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
xom6WSISuh.exe

Overview

General Information

Sample name:xom6WSISuh.exe
renamed because original name is a hash value
Original sample name:96fa199b9544b7d2015c33027e5cdfaca3a36a5de09d6805d7dfb04dfc6f91b2.exe
Analysis ID:1587874
MD5:2856d0548e14630f06b915b7ff1d8b55
SHA1:d52dc37084a8fdae9e90758212b899da10c5c48b
SHA256:96fa199b9544b7d2015c33027e5cdfaca3a36a5de09d6805d7dfb04dfc6f91b2
Tags:exeRedLineStealeruser-adrian__luca
Infos:

Detection

MassLogger RAT, PureLog Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected PureLog Stealer
Yara detected Telegram RAT
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Drops VBS files to the startup folder
Found API chain indicative of sandbox detection
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found evasive API chain (may stop execution after checking a module file name)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • xom6WSISuh.exe (PID: 2656 cmdline: "C:\Users\user\Desktop\xom6WSISuh.exe" MD5: 2856D0548E14630F06B915B7FF1D8B55)
    • gehlenite.exe (PID: 3744 cmdline: "C:\Users\user\Desktop\xom6WSISuh.exe" MD5: 2856D0548E14630F06B915B7FF1D8B55)
      • RegSvcs.exe (PID: 5076 cmdline: "C:\Users\user\Desktop\xom6WSISuh.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 3844 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • gehlenite.exe (PID: 404 cmdline: "C:\Users\user\AppData\Local\oxman\gehlenite.exe" MD5: 2856D0548E14630F06B915B7FF1D8B55)
      • RegSvcs.exe (PID: 3332 cmdline: "C:\Users\user\AppData\Local\oxman\gehlenite.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "SMTP", "From": "sendxpreview@ypcog.shop", "Password": "k4T*5ia*ES", "Server": "ypcog.shop", "To": "preview@ypcog.shop", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x1d84c:$a1: get_encryptedPassword
          • 0x1d820:$a2: get_encryptedUsername
          • 0x1d8e4:$a3: get_timePasswordChanged
          • 0x1d7fc:$a4: get_passwordField
          • 0x1d862:$a5: set_encryptedPassword
          • 0x1d62f:$a7: get_logins
          • 0x1cb9d:$a8: GetOutlookPasswords
          • 0x1c0b1:$a9: StartKeylogger
          • 0x1ab0b:$a10: KeyLoggerEventArgs
          • 0x1aada:$a11: KeyLoggerEventArgsEventHandler
          • 0x1d703:$a13: _encryptedPassword
          Click to see the 31 entries
          SourceRuleDescriptionAuthorStrings
          2.2.RegSvcs.exe.3090ee8.4.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            2.2.RegSvcs.exe.3090ee8.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.RegSvcs.exe.3090ee8.4.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                2.2.RegSvcs.exe.3090ee8.4.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                  2.2.RegSvcs.exe.3090ee8.4.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0x1ab64:$a1: get_encryptedPassword
                  • 0x1ab38:$a2: get_encryptedUsername
                  • 0x1abfc:$a3: get_timePasswordChanged
                  • 0x1ab14:$a4: get_passwordField
                  • 0x1ab7a:$a5: set_encryptedPassword
                  • 0x1a947:$a7: get_logins
                  • 0x19eb5:$a8: GetOutlookPasswords
                  • 0x193c9:$a9: StartKeylogger
                  • 0x17e23:$a10: KeyLoggerEventArgs
                  • 0x17df2:$a11: KeyLoggerEventArgsEventHandler
                  • 0x1aa1b:$a13: _encryptedPassword
                  Click to see the 93 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbs" , ProcessId: 3844, ProcessName: wscript.exe
                  Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbs" , ProcessId: 3844, ProcessName: wscript.exe

                  Data Obfuscation

                  barindex
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\oxman\gehlenite.exe, ProcessId: 3744, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbs
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-10T18:55:20.572778+010028032742Potentially Bad Traffic192.168.2.449730132.226.8.16980TCP
                  2025-01-10T18:55:29.589691+010028032742Potentially Bad Traffic192.168.2.449738132.226.8.16980TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 8.2.RegSvcs.exe.4416458.1.raw.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "sendxpreview@ypcog.shop", "Password": "k4T*5ia*ES", "Server": "ypcog.shop", "To": "preview@ypcog.shop", "Port": 587}
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeReversingLabs: Detection: 68%
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeVirustotal: Detection: 74%Perma Link
                  Source: xom6WSISuh.exeVirustotal: Detection: 74%Perma Link
                  Source: xom6WSISuh.exeReversingLabs: Detection: 68%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeJoe Sandbox ML: detected
                  Source: xom6WSISuh.exeJoe Sandbox ML: detected

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: xom6WSISuh.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.4:49732 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.4:49739 version: TLS 1.0
                  Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986285277.0000000002F89000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: gehlenite.exe, 00000001.00000003.1772660264.0000000003620000.00000004.00001000.00020000.00000000.sdmp, gehlenite.exe, 00000001.00000003.1773073049.0000000003480000.00000004.00001000.00020000.00000000.sdmp, gehlenite.exe, 00000005.00000003.1931884711.0000000003C30000.00000004.00001000.00020000.00000000.sdmp, gehlenite.exe, 00000005.00000003.1933902415.0000000003A90000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: gehlenite.exe, 00000001.00000003.1772660264.0000000003620000.00000004.00001000.00020000.00000000.sdmp, gehlenite.exe, 00000001.00000003.1773073049.0000000003480000.00000004.00001000.00020000.00000000.sdmp, gehlenite.exe, 00000005.00000003.1931884711.0000000003C30000.00000004.00001000.00020000.00000000.sdmp, gehlenite.exe, 00000005.00000003.1933902415.0000000003A90000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0012DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0012DBBE
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_001368EE FindFirstFileW,FindClose,0_2_001368EE
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0013698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0013698F
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0012D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0012D076
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0012D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0012D3A9
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00139642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00139642
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0013979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0013979D
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00139B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00139B2B
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00135C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00135C97
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_005DDBBE
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005E68EE FindFirstFileW,FindClose,1_2_005E68EE
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_005E698F
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_005DD076
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_005DD3A9
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_005E9642
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_005E979D
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_005E9B2B
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005E5C97 FindFirstFileW,FindNextFileW,FindClose,1_2_005E5C97
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,5_2_005DDBBE
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005E68EE FindFirstFileW,FindClose,5_2_005E68EE
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,5_2_005E698F
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_005DD076
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_005DD3A9
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_005E9642
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_005E979D
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,5_2_005E9B2B
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005E5C97 FindFirstFileW,FindNextFileW,FindClose,5_2_005E5C97
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h2_2_02AAE2E0
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                  Source: Joe Sandbox ViewIP Address: 104.21.112.1 104.21.112.1
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49738 -> 132.226.8.169:80
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49730 -> 132.226.8.169:80
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.4:49732 version: TLS 1.0
                  Source: unknownHTTPS traffic detected: 104.21.112.1:443 -> 192.168.2.4:49739 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0013CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0013CE44
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: RegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986816837.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034F0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: RegSvcs.exe, 00000002.00000002.2986816837.0000000003179000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.0000000003479000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: RegSvcs.exe, 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: RegSvcs.exe, 00000002.00000002.2986816837.0000000003218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.0000000003518000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000002.00000002.2986816837.00000000031B8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.0000000003479000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: RegSvcs.exe, 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                  Source: RegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: RegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: RegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0013EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0013EAFF
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0013ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0013ED6A
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005EED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_005EED6A
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005EED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,5_2_005EED6A
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0013EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0013EAFF
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0012AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0012AA57
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00159576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00159576
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00609576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_00609576
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00609576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,5_2_00609576

                  System Summary

                  barindex
                  Source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.2.gehlenite.exe.35c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 1.2.gehlenite.exe.af0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000005.00000002.1940996077.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000001.00000002.1775907851.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: RegSvcs.exe PID: 3332, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: xom6WSISuh.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: xom6WSISuh.exe, 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_0b317ab8-9
                  Source: xom6WSISuh.exe, 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_20f78945-9
                  Source: gehlenite.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: gehlenite.exe, 00000001.00000002.1775302014.0000000000632000.00000040.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b778c1b3-a
                  Source: gehlenite.exe, 00000001.00000002.1775302014.0000000000632000.00000040.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_21d7a9b6-c
                  Source: gehlenite.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: gehlenite.exe, 00000005.00000002.1939131763.0000000000632000.00000040.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_261dc83d-e
                  Source: gehlenite.exe, 00000005.00000002.1939131763.0000000000632000.00000040.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_dc5189ab-a
                  Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000C3170 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,0_2_000C3170
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0015A2D7 NtdllDialogWndProc_W,0_2_0015A2D7
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_001587B2 NtdllDialogWndProc_W,CallWindowProcW,0_2_001587B2
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00158AAA NtdllDialogWndProc_W,0_2_00158AAA
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000D8BA4 NtdllDialogWndProc_W,0_2_000D8BA4
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00158FC9 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,0_2_00158FC9
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000D9052 NtdllDialogWndProc_W,0_2_000D9052
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000D90A7 NtdllDialogWndProc_W,0_2_000D90A7
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_001590A1 SendMessageW,NtdllDialogWndProc_W,0_2_001590A1
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0015911E DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,0_2_0015911E
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00159380 NtdllDialogWndProc_W,0_2_00159380
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_001593CB NtdllDialogWndProc_W,0_2_001593CB
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00159400 ClientToScreen,NtdllDialogWndProc_W,0_2_00159400
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0015953A GetWindowLongW,NtdllDialogWndProc_W,0_2_0015953A
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00159576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00159576
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000D97C0 GetParent,NtdllDialogWndProc_W,0_2_000D97C0
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000D997D NtdllDialogWndProc_W,GetSysColor,SetBkColor,745EC8D0,NtdllDialogWndProc_W,0_2_000D997D
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00159E74 NtdllDialogWndProc_W,0_2_00159E74
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00159EF3 GetClientRect,GetCursorPos,ScreenToClient,NtdllDialogWndProc_W,0_2_00159EF3
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00159F86 GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W,0_2_00159F86
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00573170 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,1_2_00573170
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_0060A2D7 NtdllDialogWndProc_W,1_2_0060A2D7
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_006087B2 NtdllDialogWndProc_W,CallWindowProcW,1_2_006087B2
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00608AAA NtdllDialogWndProc_W,1_2_00608AAA
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00588BA4 NtdllDialogWndProc_W,1_2_00588BA4
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00608FC9 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,1_2_00608FC9
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00589052 NtdllDialogWndProc_W,1_2_00589052
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_006090A1 SendMessageW,NtdllDialogWndProc_W,1_2_006090A1
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005890A7 NtdllDialogWndProc_W,1_2_005890A7
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_0060911E DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,1_2_0060911E
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_006093CB NtdllDialogWndProc_W,1_2_006093CB
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00609380 NtdllDialogWndProc_W,1_2_00609380
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00609400 ClientToScreen,NtdllDialogWndProc_W,1_2_00609400
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00609576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_00609576
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_0060953A GetWindowLongW,NtdllDialogWndProc_W,1_2_0060953A
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005897C0 GetParent,NtdllDialogWndProc_W,1_2_005897C0
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_0058997D NtdllDialogWndProc_W,GetSysColor,SetBkColor,745EC8D0,NtdllDialogWndProc_W,1_2_0058997D
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00609E74 NtdllDialogWndProc_W,1_2_00609E74
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00609EF3 GetClientRect,GetCursorPos,ScreenToClient,NtdllDialogWndProc_W,1_2_00609EF3
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00609F86 GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W,1_2_00609F86
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00573170 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,5_2_00573170
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_0060A2D7 NtdllDialogWndProc_W,5_2_0060A2D7
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_006087B2 NtdllDialogWndProc_W,CallWindowProcW,5_2_006087B2
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00608AAA NtdllDialogWndProc_W,5_2_00608AAA
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00588BA4 NtdllDialogWndProc_W,5_2_00588BA4
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00608FC9 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,5_2_00608FC9
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00589052 NtdllDialogWndProc_W,5_2_00589052
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_006090A1 SendMessageW,NtdllDialogWndProc_W,5_2_006090A1
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005890A7 NtdllDialogWndProc_W,5_2_005890A7
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_0060911E DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,5_2_0060911E
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_006093CB NtdllDialogWndProc_W,5_2_006093CB
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00609380 NtdllDialogWndProc_W,5_2_00609380
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00609400 ClientToScreen,NtdllDialogWndProc_W,5_2_00609400
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00609576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,5_2_00609576
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_0060953A GetWindowLongW,NtdllDialogWndProc_W,5_2_0060953A
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005897C0 GetParent,NtdllDialogWndProc_W,5_2_005897C0
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_0058997D NtdllDialogWndProc_W,GetSysColor,SetBkColor,745EC8D0,NtdllDialogWndProc_W,5_2_0058997D
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00609E74 NtdllDialogWndProc_W,5_2_00609E74
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00609EF3 GetClientRect,GetCursorPos,ScreenToClient,NtdllDialogWndProc_W,5_2_00609EF3
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00609F86 GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W,5_2_00609F86
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0012D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0012D5EB
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00121201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,74B45590,CreateProcessAsUserW,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,0_2_00121201
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0012E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0012E8F6
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005DE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_005DE8F6
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005DE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,5_2_005DE8F6
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_001320460_2_00132046
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000C80600_2_000C8060
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_001282980_2_00128298
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000FE4FF0_2_000FE4FF
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000F676B0_2_000F676B
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_001548730_2_00154873
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000ECAA00_2_000ECAA0
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000CCAF00_2_000CCAF0
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000DCC390_2_000DCC39
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000F6DD90_2_000F6DD9
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000DB1190_2_000DB119
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000C91C00_2_000C91C0
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000E13940_2_000E1394
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000E17060_2_000E1706
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000E781B0_2_000E781B
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000C79200_2_000C7920
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000D997D0_2_000D997D
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000E19B00_2_000E19B0
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000E7A4A0_2_000E7A4A
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000E1C770_2_000E1C77
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000E7CA70_2_000E7CA7
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0014BE440_2_0014BE44
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000F9EEE0_2_000F9EEE
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000E1F320_2_000E1F32
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00BE89A80_2_00BE89A8
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_0057BF401_2_0057BF40
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005E20461_2_005E2046
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005780601_2_00578060
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005D82981_2_005D8298
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005AE4FF1_2_005AE4FF
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005A676B1_2_005A676B
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_006048731_2_00604873
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_0057CAF01_2_0057CAF0
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_0059CAA01_2_0059CAA0
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_0058CC391_2_0058CC39
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005A6DD91_2_005A6DD9
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_0058B1191_2_0058B119
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005791C01_2_005791C0
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005913941_2_00591394
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005917061_2_00591706
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_0059781B1_2_0059781B
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_0058997D1_2_0058997D
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005779201_2_00577920
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005919B01_2_005919B0
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00597A4A1_2_00597A4A
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00591C771_2_00591C77
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00597CA71_2_00597CA7
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005FBE441_2_005FBE44
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005A9EEE1_2_005A9EEE
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00591F321_2_00591F32
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00DD3F101_2_00DD3F10
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00408C602_2_00408C60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040DC112_2_0040DC11
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00407C3F2_2_00407C3F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00418CCC2_2_00418CCC
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00406CA02_2_00406CA0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004028B02_2_004028B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041A4BE2_2_0041A4BE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00408C602_2_00408C60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004182442_2_00418244
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F202_2_00402F20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004193C42_2_004193C4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004187882_2_00418788
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F892_2_00402F89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402B902_2_00402B90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004073A02_2_004073A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02AA14382_2_02AA1438
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02AA14482_2_02AA1448
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02AA11A82_2_02AA11A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02AA119C2_2_02AA119C
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_0057BF405_2_0057BF40
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005E20465_2_005E2046
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005780605_2_00578060
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005D82985_2_005D8298
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005AE4FF5_2_005AE4FF
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005A676B5_2_005A676B
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_006048735_2_00604873
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_0057CAF05_2_0057CAF0
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_0059CAA05_2_0059CAA0
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_0058CC395_2_0058CC39
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005A6DD95_2_005A6DD9
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_0058B1195_2_0058B119
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005791C05_2_005791C0
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005913945_2_00591394
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005917065_2_00591706
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_0059781B5_2_0059781B
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_0058997D5_2_0058997D
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005779205_2_00577920
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005919B05_2_005919B0
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00597A4A5_2_00597A4A
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00591C775_2_00591C77
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00597CA75_2_00597CA7
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005FBE445_2_005FBE44
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005A9EEE5_2_005A9EEE
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00591F325_2_00591F32
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_01273E705_2_01273E70
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: String function: 005B1F50 appears 52 times
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: String function: 00579CB3 appears 60 times
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: String function: 005DDF27 appears 32 times
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: String function: 0058F9F2 appears 62 times
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: String function: 0057988F appears 34 times
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: String function: 0057600E appears 34 times
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: String function: 00594A28 appears 40 times
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: String function: 00598E0B appears 36 times
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: String function: 005A2FA6 appears 48 times
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: String function: 0057CFA0 appears 44 times
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: String function: 00594963 appears 54 times
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: String function: 00590A30 appears 92 times
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 43 times
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: String function: 000E0A30 appears 46 times
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: String function: 000DF9F2 appears 31 times
                  Source: xom6WSISuh.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 5.2.gehlenite.exe.35c0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 1.2.gehlenite.exe.af0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000005.00000002.1940996077.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000001.00000002.1775907851.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: RegSvcs.exe PID: 3332, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@10/6@2/2
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_001337B5 GetLastError,FormatMessageW,0_2_001337B5
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_001210BF AdjustTokenPrivileges,CloseHandle,0_2_001210BF
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_001216C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_001216C3
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005D10BF AdjustTokenPrivileges,CloseHandle,1_2_005D10BF
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005D16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_005D16C3
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005D10BF AdjustTokenPrivileges,CloseHandle,5_2_005D10BF
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005D16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,5_2_005D16C3
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_001351CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_001351CD
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0014A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0014A67C
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0013648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0013648E
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000C42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_000C42A2
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeFile created: C:\Users\user\AppData\Local\oxmanJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeFile created: C:\Users\user\AppData\Local\Temp\aut1E99.tmpJump to behavior
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbs"
                  Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000002.00000002.2986816837.000000000325B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986816837.000000000326B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986816837.0000000003279000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.000000000355B000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.0000000003579000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.000000000356B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: xom6WSISuh.exeVirustotal: Detection: 74%
                  Source: xom6WSISuh.exeReversingLabs: Detection: 68%
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeFile read: C:\Users\user\Desktop\xom6WSISuh.exeJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\xom6WSISuh.exe "C:\Users\user\Desktop\xom6WSISuh.exe"
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeProcess created: C:\Users\user\AppData\Local\oxman\gehlenite.exe "C:\Users\user\Desktop\xom6WSISuh.exe"
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\xom6WSISuh.exe"
                  Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbs"
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\oxman\gehlenite.exe "C:\Users\user\AppData\Local\oxman\gehlenite.exe"
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\oxman\gehlenite.exe"
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeProcess created: C:\Users\user\AppData\Local\oxman\gehlenite.exe "C:\Users\user\Desktop\xom6WSISuh.exe"Jump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\xom6WSISuh.exe"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\oxman\gehlenite.exe "C:\Users\user\AppData\Local\oxman\gehlenite.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\oxman\gehlenite.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986285277.0000000002F89000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdbUGP source: gehlenite.exe, 00000001.00000003.1772660264.0000000003620000.00000004.00001000.00020000.00000000.sdmp, gehlenite.exe, 00000001.00000003.1773073049.0000000003480000.00000004.00001000.00020000.00000000.sdmp, gehlenite.exe, 00000005.00000003.1931884711.0000000003C30000.00000004.00001000.00020000.00000000.sdmp, gehlenite.exe, 00000005.00000003.1933902415.0000000003A90000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: gehlenite.exe, 00000001.00000003.1772660264.0000000003620000.00000004.00001000.00020000.00000000.sdmp, gehlenite.exe, 00000001.00000003.1773073049.0000000003480000.00000004.00001000.00020000.00000000.sdmp, gehlenite.exe, 00000005.00000003.1931884711.0000000003C30000.00000004.00001000.00020000.00000000.sdmp, gehlenite.exe, 00000005.00000003.1933902415.0000000003A90000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000C42DE
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000E0A76 push ecx; ret 0_2_000E0A89
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00590A76 push ecx; ret 1_2_00590A89
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00DD02D2 push edi; ret 1_2_00DD0311
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C40C push cs; iretd 2_2_0041C4E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C50E push cs; iretd 2_2_0041C4E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E21D push ecx; ret 2_2_0040E230
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C6BE push ebx; ret 2_2_0041C6BF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040BB97 push dword ptr [ecx-75h]; iretd 2_2_0040BBA3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02AA4692 push ebx; iretd 2_2_02AA469C
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00590A76 push ecx; ret 5_2_00590A89
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeFile created: C:\Users\user\AppData\Local\oxman\gehlenite.exeJump to dropped file

                  Boot Survival

                  barindex
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbsJump to dropped file
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbsJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbsJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000DF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_000DF98E
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00151C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00151C41
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_0058F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_0058F98E
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00601C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_00601C41
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_0058F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,5_2_0058F98E
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00601C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,5_2_00601C41
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3332, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-98294
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleep
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeAPI/Special instruction interceptor: Address: DD3B34
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeAPI/Special instruction interceptor: Address: 1273A94
                  Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleep
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeAPI coverage: 3.9 %
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeAPI coverage: 4.2 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI coverage: 5.5 %
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeAPI coverage: 4.0 %
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0012DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0012DBBE
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_001368EE FindFirstFileW,FindClose,0_2_001368EE
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0013698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0013698F
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0012D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0012D076
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0012D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0012D3A9
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00139642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00139642
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0013979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0013979D
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00139B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00139B2B
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00135C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00135C97
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_005DDBBE
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005E68EE FindFirstFileW,FindClose,1_2_005E68EE
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_005E698F
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_005DD076
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_005DD3A9
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_005E9642
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_005E979D
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_005E9B2B
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005E5C97 FindFirstFileW,FindNextFileW,FindClose,1_2_005E5C97
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,5_2_005DDBBE
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005E68EE FindFirstFileW,FindClose,5_2_005E68EE
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,5_2_005E698F
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_005DD076
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,5_2_005DD3A9
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_005E9642
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,5_2_005E979D
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,5_2_005E9B2B
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005E5C97 FindFirstFileW,FindNextFileW,FindClose,5_2_005E5C97
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000C42DE
                  Source: wscript.exe, 00000004.00000002.1893794028.000002B8253C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                  Source: wscript.exe, 00000004.00000002.1893794028.000002B8253C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}iT
                  Source: RegSvcs.exe, 00000008.00000002.2985783718.000000000149E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllk
                  Source: RegSvcs.exe, 00000002.00000002.2985008089.0000000000F3F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll@
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0013EAA2 BlockInput,0_2_0013EAA2
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000F2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000F2622
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000C42DE
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000E4CE8 mov eax, dword ptr fs:[00000030h]0_2_000E4CE8
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00BE8898 mov eax, dword ptr fs:[00000030h]0_2_00BE8898
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00BE8838 mov eax, dword ptr fs:[00000030h]0_2_00BE8838
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00BE71F8 mov eax, dword ptr fs:[00000030h]0_2_00BE71F8
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00594CE8 mov eax, dword ptr fs:[00000030h]1_2_00594CE8
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00DD2760 mov eax, dword ptr fs:[00000030h]1_2_00DD2760
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00DD3DA0 mov eax, dword ptr fs:[00000030h]1_2_00DD3DA0
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00DD3E00 mov eax, dword ptr fs:[00000030h]1_2_00DD3E00
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00594CE8 mov eax, dword ptr fs:[00000030h]5_2_00594CE8
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_012726C0 mov eax, dword ptr fs:[00000030h]5_2_012726C0
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_01273D00 mov eax, dword ptr fs:[00000030h]5_2_01273D00
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_01273D60 mov eax, dword ptr fs:[00000030h]5_2_01273D60
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00120B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00120B62
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000F2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000F2622
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000E083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000E083F
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000E09D5 SetUnhandledExceptionFilter,0_2_000E09D5
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000E0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_000E0C21
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005A2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_005A2622
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_0059083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0059083F
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005909D5 SetUnhandledExceptionFilter,1_2_005909D5
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_00590C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00590C21
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040CE09
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040E61C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00416F6A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004123F1 SetUnhandledExceptionFilter,2_2_004123F1
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005A2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_005A2622
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_0059083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_0059083F
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005909D5 SetUnhandledExceptionFilter,5_2_005909D5
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_00590C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_00590C21
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: D48008Jump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: F47008Jump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00121201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,74B45590,CreateProcessAsUserW,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,0_2_00121201
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00102BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00102BA5
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0012B226 SendInput,keybd_event,0_2_0012B226
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_001422DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_001422DA
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\xom6WSISuh.exe"Jump to behavior
                  Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\oxman\gehlenite.exe "C:\Users\user\AppData\Local\oxman\gehlenite.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\oxman\gehlenite.exe" Jump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00120B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00120B62
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00121663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00121663
                  Source: xom6WSISuh.exe, 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmp, gehlenite.exe, 00000001.00000002.1775302014.0000000000632000.00000040.00000001.01000000.00000004.sdmp, gehlenite.exe, 00000005.00000002.1939131763.0000000000632000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: gehlenite.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000E0698 cpuid 0_2_000E0698
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,2_2_00417A20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00138195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00138195
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_0011D27A GetUserNameW,0_2_0011D27A
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000FBB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_000FBB6F
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_000C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_000C42DE
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3332, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3332, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: gehlenite.exeBinary or memory string: WIN_81
                  Source: gehlenite.exeBinary or memory string: WIN_XP
                  Source: gehlenite.exe, 00000005.00000002.1939131763.0000000000632000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                  Source: gehlenite.exeBinary or memory string: WIN_XPe
                  Source: gehlenite.exeBinary or memory string: WIN_VISTA
                  Source: gehlenite.exeBinary or memory string: WIN_7
                  Source: gehlenite.exeBinary or memory string: WIN_8
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2986816837.00000000032A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2986752366.00000000035A0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3332, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3332, type: MEMORYSTR
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090ee8.4.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c31b76.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c31b76.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090000.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4415570.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090000.3.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.3090ee8.4.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5570000.7.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4415570.3.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4416458.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.443e790.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.443e790.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 8.2.RegSvcs.exe.4416458.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c30c8e.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.5570000.7.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegSvcs.exe.2c30c8e.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5076, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3332, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00141204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00141204
                  Source: C:\Users\user\Desktop\xom6WSISuh.exeCode function: 0_2_00141806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00141806
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005F1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,1_2_005F1204
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 1_2_005F1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_005F1806
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005F1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,5_2_005F1204
                  Source: C:\Users\user\AppData\Local\oxman\gehlenite.exeCode function: 5_2_005F1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,5_2_005F1806
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information111
                  Scripting
                  2
                  Valid Accounts
                  2
                  Native API
                  111
                  Scripting
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault AccountsScheduled Task/Job1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAt2
                  Valid Accounts
                  2
                  Valid Accounts
                  31
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCron2
                  Registry Run Keys / Startup Folder
                  21
                  Access Token Manipulation
                  1
                  Software Packing
                  NTDS137
                  System Information Discovery
                  Distributed Component Object Model21
                  Input Capture
                  13
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  1
                  DLL Side-Loading
                  LSA Secrets321
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
                  Registry Run Keys / Startup Folder
                  1
                  Masquerading
                  Cached Domain Credentials1
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                  Valid Accounts
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Virtualization/Sandbox Evasion
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                  Access Token Manipulation
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
                  Process Injection
                  Network Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1587874 Sample: xom6WSISuh.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 30 reallyfreegeoip.org 2->30 32 checkip.dyndns.org 2->32 34 checkip.dyndns.com 2->34 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Multi AV Scanner detection for submitted file 2->44 48 9 other signatures 2->48 8 xom6WSISuh.exe 4 2->8         started        12 wscript.exe 1 2->12         started        signatures3 46 Tries to detect the country of the analysis system (by using the IP) 30->46 process4 file5 26 C:\Users\user\AppData\Local\...\gehlenite.exe, PE32 8->26 dropped 54 Binary is likely a compiled AutoIt script file 8->54 56 Found API chain indicative of sandbox detection 8->56 14 gehlenite.exe 2 8->14         started        58 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->58 18 gehlenite.exe 1 12->18         started        signatures6 process7 file8 28 C:\Users\user\AppData\...\gehlenite.vbs, data 14->28 dropped 60 Multi AV Scanner detection for dropped file 14->60 62 Binary is likely a compiled AutoIt script file 14->62 64 Machine Learning detection for dropped file 14->64 70 3 other signatures 14->70 20 RegSvcs.exe 15 2 14->20         started        66 Writes to foreign memory regions 18->66 68 Maps a DLL or memory area into another process 18->68 24 RegSvcs.exe 2 18->24         started        signatures9 process10 dnsIp11 36 checkip.dyndns.com 132.226.8.169, 49730, 49738, 80 UTMEMUS United States 20->36 38 reallyfreegeoip.org 104.21.112.1, 443, 49732, 49739 CLOUDFLARENETUS United States 20->38 50 Tries to steal Mail credentials (via file / registry access) 24->50 52 Tries to harvest and steal browser information (history, passwords, etc) 24->52 signatures12

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  xom6WSISuh.exe75%VirustotalBrowse
                  xom6WSISuh.exe68%ReversingLabsWin32.Trojan.AutoitInject
                  xom6WSISuh.exe100%Joe Sandbox ML
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\oxman\gehlenite.exe100%Joe Sandbox ML
                  C:\Users\user\AppData\Local\oxman\gehlenite.exe68%ReversingLabsWin32.Trojan.AutoitInject
                  C:\Users\user\AppData\Local\oxman\gehlenite.exe75%VirustotalBrowse
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  reallyfreegeoip.org
                  104.21.112.1
                  truefalse
                    high
                    checkip.dyndns.com
                    132.226.8.169
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                          high
                          https://reallyfreegeoip.org/xml/8.46.123.189false
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986816837.00000000031F0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034F0000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://checkip.dyndns.comRegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/8.46.123.189lRegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.2986816837.00000000031B8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.0000000003479000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://api.telegram.org/bot-/sendDocument?chat_id=RegSvcs.exe, 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://checkip.dyndns.org/qRegSvcs.exe, 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.2986816837.0000000003218000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.0000000003518000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://reallyfreegeoip.org/xml/RegSvcs.exe, 00000002.00000002.2986816837.00000000031FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2986752366.00000000034FC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              132.226.8.169
                                              checkip.dyndns.comUnited States
                                              16989UTMEMUSfalse
                                              104.21.112.1
                                              reallyfreegeoip.orgUnited States
                                              13335CLOUDFLARENETUSfalse
                                              Joe Sandbox version:42.0.0 Malachite
                                              Analysis ID:1587874
                                              Start date and time:2025-01-10 18:54:08 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 8m 12s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:10
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:0
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:xom6WSISuh.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:96fa199b9544b7d2015c33027e5cdfaca3a36a5de09d6805d7dfb04dfc6f91b2.exe
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.expl.evad.winEXE@10/6@2/2
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 98%
                                              • Number of executed functions: 49
                                              • Number of non-executed functions: 307
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                              • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Not all processes where analyzed, report is missing behavior information
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                              TimeTypeDescription
                                              17:55:11AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbs
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              132.226.8.1693WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                              • checkip.dyndns.org/
                                              r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              jqxrkk.ps1Get hashmaliciousMassLogger RATBrowse
                                              • checkip.dyndns.org/
                                              Order_List.scr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                              • checkip.dyndns.org/
                                              pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • checkip.dyndns.org/
                                              104.21.112.1QUOTATION#070125-ELITE MARINE .exeGet hashmaliciousFormBookBrowse
                                              • www.buyspeechst.shop/w98i/
                                              wxl1r0lntg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                              • 838596cm.nyafka.top/lineLongpolllinuxFlowercentraluploads.php
                                              SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                              • beammp.com/phpmyadmin/
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              reallyfreegeoip.orgAHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 104.21.64.1
                                              eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                              • 104.21.64.1
                                              MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                              • 104.21.96.1
                                              3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                              • 104.21.80.1
                                              SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.16.1
                                              v3tK92KcJV.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.16.1
                                              r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                              • 104.21.80.1
                                              RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 104.21.80.1
                                              zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.112.1
                                              MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.112.1
                                              checkip.dyndns.comAHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 193.122.6.168
                                              eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                              • 132.226.247.73
                                              MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                              • 158.101.44.242
                                              3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                              • 132.226.8.169
                                              SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 193.122.6.168
                                              v3tK92KcJV.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 132.226.247.73
                                              r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.8.169
                                              RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 158.101.44.242
                                              zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 193.122.130.0
                                              MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 132.226.247.73
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              UTMEMUSeLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                              • 132.226.247.73
                                              3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                              • 132.226.8.169
                                              v3tK92KcJV.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 132.226.247.73
                                              r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.8.169
                                              MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 132.226.247.73
                                              8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.247.73
                                              b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 132.226.8.169
                                              New Order-090125.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                              • 132.226.247.73
                                              B7N48hmO78.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.247.73
                                              #U0130LC#U0130 HOLD#U0130NG a.s fiyati_teklif 017867Sipari#U015fi jpeg doc .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 132.226.247.73
                                              CLOUDFLARENETUS3HnH4uJtE7.exeGet hashmaliciousFormBookBrowse
                                              • 104.21.48.233
                                              https://www.mentimeter.com/app/presentation/alp52o7zih4ubnvbqe9pvb585a1z3bd7/edit?source=share-modalGet hashmaliciousUnknownBrowse
                                              • 104.17.25.14
                                              AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 104.21.64.1
                                              eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                              • 104.21.64.1
                                              Encrypted_Archive_2025_LHC1W64SMW.htmlGet hashmaliciousHTMLPhisherBrowse
                                              • 104.17.25.14
                                              MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                              • 104.21.96.1
                                              3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                              • 104.21.80.1
                                              SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.16.1
                                              KcSzB2IpP5.exeGet hashmaliciousFormBookBrowse
                                              • 188.114.96.3
                                              secured File__esperion.com.htmlGet hashmaliciousPhisherBrowse
                                              • 104.17.25.14
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              54328bd36c14bd82ddaa0c04b25ed9adAHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                              • 104.21.112.1
                                              eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                              • 104.21.112.1
                                              MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                              • 104.21.112.1
                                              3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                              • 104.21.112.1
                                              SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.112.1
                                              v3tK92KcJV.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.112.1
                                              r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                              • 104.21.112.1
                                              RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 104.21.112.1
                                              zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.112.1
                                              MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.112.1
                                              No context
                                              Process:C:\Users\user\Desktop\xom6WSISuh.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):205250
                                              Entropy (8bit):7.978000823733601
                                              Encrypted:false
                                              SSDEEP:6144:im40Vggq7h9aqXRfzl5FuqDNPSKATf+91afkqnh0J5j1O1:vVggq7hEqhfnDpSKAK1afkqne5G
                                              MD5:231518925D130A2E9BC279ECCB1395A7
                                              SHA1:AC704129495BA8AD5AF32CDF85A189DC58DD5C60
                                              SHA-256:66B4056F3220DF609DD3E173CC600F2B2E4A76E3403307DB4CA147A46FD6C8F1
                                              SHA-512:C812618EAE940438AC5B68098887BEAE5EFF998C49B12E1E8086F11BCAF33F24086B4168D45E4A6B43E79CC3110C39188524C327525AF951DB7E5827B982DBAB
                                              Malicious:false
                                              Reputation:low
                                              Preview:EA06..4..@83z..oJ.S+.].2.3.R&ti..Q....I...D..&t..\...~....T.cj....m.Q!..-.M!.Y.....9...5...U0......Q..M.78../'..'..L....T..O...}...i...(ZI...I..d..4...Y.:..~k.E(Z.D..?..)=...1...Z.m..H.F.[.}.c[..:i0.G...j6 ..R.N._..)...7..^.D.S.s*|.g.M......k........[.?/.zT..T.L.`.L..?5...zu#.}.L....bq7.L)....GN.H...H.&..1.Y..Y..o&.S@T>.&..H......Y.Mf......*..d...Ld4....+...u.......)......8.....aR..$..........."."Fe..........i..G.T'.....Z....$..*J$4Y.:Q1.M.....t.Q.A..8..?..+...qa.z.n{Z.m....*W..Qx.:..H..(V.EX.]._..S....?.,'.....h.?E.o..L.V.B..H..v.=.........O>.`..1./......n3z..{..|.t...o3.m.U.....mn.?u...L1..e.m....Y.#k.U.sY./....l|..k.N..'T.~.O...f.....E.E..nE.a...4.....r.4z......>.........".b.L.q.Bo...s.h..'......"..._"v...k.E...o..F.K.DK...a.....&.w<.u&Ti..^..~.O....Q&|JU....M..]u.!..M.....3.l...VoJ...~...Z.t..x....}B.c.P.{.....$..h..3......m...&..l./n..9.(.:o8.r.<8.&....t...u.....J......6.?...._..w...~.=.$.!.....%.....(w.E....(.JU2.....<.dg.k.K'..M.
                                              Process:C:\Users\user\AppData\Local\oxman\gehlenite.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):205250
                                              Entropy (8bit):7.978000823733601
                                              Encrypted:false
                                              SSDEEP:6144:im40Vggq7h9aqXRfzl5FuqDNPSKATf+91afkqnh0J5j1O1:vVggq7hEqhfnDpSKAK1afkqne5G
                                              MD5:231518925D130A2E9BC279ECCB1395A7
                                              SHA1:AC704129495BA8AD5AF32CDF85A189DC58DD5C60
                                              SHA-256:66B4056F3220DF609DD3E173CC600F2B2E4A76E3403307DB4CA147A46FD6C8F1
                                              SHA-512:C812618EAE940438AC5B68098887BEAE5EFF998C49B12E1E8086F11BCAF33F24086B4168D45E4A6B43E79CC3110C39188524C327525AF951DB7E5827B982DBAB
                                              Malicious:false
                                              Reputation:low
                                              Preview:EA06..4..@83z..oJ.S+.].2.3.R&ti..Q....I...D..&t..\...~....T.cj....m.Q!..-.M!.Y.....9...5...U0......Q..M.78../'..'..L....T..O...}...i...(ZI...I..d..4...Y.:..~k.E(Z.D..?..)=...1...Z.m..H.F.[.}.c[..:i0.G...j6 ..R.N._..)...7..^.D.S.s*|.g.M......k........[.?/.zT..T.L.`.L..?5...zu#.}.L....bq7.L)....GN.H...H.&..1.Y..Y..o&.S@T>.&..H......Y.Mf......*..d...Ld4....+...u.......)......8.....aR..$..........."."Fe..........i..G.T'.....Z....$..*J$4Y.:Q1.M.....t.Q.A..8..?..+...qa.z.n{Z.m....*W..Qx.:..H..(V.EX.]._..S....?.,'.....h.?E.o..L.V.B..H..v.=.........O>.`..1./......n3z..{..|.t...o3.m.U.....mn.?u...L1..e.m....Y.#k.U.sY./....l|..k.N..'T.~.O...f.....E.E..nE.a...4.....r.4z......>.........".b.L.q.Bo...s.h..'......"..._"v...k.E...o..F.K.DK...a.....&.w<.u&Ti..^..~.O....Q&|JU....M..]u.!..M.....3.l...VoJ...~...Z.t..x....}B.c.P.{.....$..h..3......m...&..l./n..9.(.:o8.r.<8.&....t...u.....J......6.?...._..w...~.=.$.!.....%.....(w.E....(.JU2.....<.dg.k.K'..M.
                                              Process:C:\Users\user\AppData\Local\oxman\gehlenite.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):205250
                                              Entropy (8bit):7.978000823733601
                                              Encrypted:false
                                              SSDEEP:6144:im40Vggq7h9aqXRfzl5FuqDNPSKATf+91afkqnh0J5j1O1:vVggq7hEqhfnDpSKAK1afkqne5G
                                              MD5:231518925D130A2E9BC279ECCB1395A7
                                              SHA1:AC704129495BA8AD5AF32CDF85A189DC58DD5C60
                                              SHA-256:66B4056F3220DF609DD3E173CC600F2B2E4A76E3403307DB4CA147A46FD6C8F1
                                              SHA-512:C812618EAE940438AC5B68098887BEAE5EFF998C49B12E1E8086F11BCAF33F24086B4168D45E4A6B43E79CC3110C39188524C327525AF951DB7E5827B982DBAB
                                              Malicious:false
                                              Reputation:low
                                              Preview:EA06..4..@83z..oJ.S+.].2.3.R&ti..Q....I...D..&t..\...~....T.cj....m.Q!..-.M!.Y.....9...5...U0......Q..M.78../'..'..L....T..O...}...i...(ZI...I..d..4...Y.:..~k.E(Z.D..?..)=...1...Z.m..H.F.[.}.c[..:i0.G...j6 ..R.N._..)...7..^.D.S.s*|.g.M......k........[.?/.zT..T.L.`.L..?5...zu#.}.L....bq7.L)....GN.H...H.&..1.Y..Y..o&.S@T>.&..H......Y.Mf......*..d...Ld4....+...u.......)......8.....aR..$..........."."Fe..........i..G.T'.....Z....$..*J$4Y.:Q1.M.....t.Q.A..8..?..+...qa.z.n{Z.m....*W..Qx.:..H..(V.EX.]._..S....?.,'.....h.?E.o..L.V.B..H..v.=.........O>.`..1./......n3z..{..|.t...o3.m.U.....mn.?u...L1..e.m....Y.#k.U.sY./....l|..k.N..'T.~.O...f.....E.E..nE.a...4.....r.4z......>.........".b.L.q.Bo...s.h..'......"..._"v...k.E...o..F.K.DK...a.....&.w<.u&Ti..^..~.O....Q&|JU....M..]u.!..M.....3.l...VoJ...~...Z.t..x....}B.c.P.{.....$..h..3......m...&..l./n..9.(.:o8.r.<8.&....t...u.....J......6.?...._..w...~.=.$.!.....%.....(w.E....(.JU2.....<.dg.k.K'..M.
                                              Process:C:\Users\user\Desktop\xom6WSISuh.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):209920
                                              Entropy (8bit):7.817802369789991
                                              Encrypted:false
                                              SSDEEP:6144:VIiy+yNm5JL1hDOCmN6C67RKm7vFPwwJIIKk2lf:jy+yQD1hAN6C67t7vFP7BD2F
                                              MD5:BB11EAF00DE1167EE551A0663341546D
                                              SHA1:CDACEC3B3423A62BE863C48E36CCA4D967BB44A5
                                              SHA-256:BB3CF210B92DBFEF354FD2F421FE916F79FDCCD8B6B48B38B55608A67810A8EA
                                              SHA-512:106A86E089750C3B6E773EB576E61DF8BDB5EE9B6DEE1245DC2BC549E5B13EA883CDC216A9AD537414028BC8D1C831D7530EEAD924AC8A83B946FBCAA742D3BD
                                              Malicious:false
                                              Reputation:low
                                              Preview:~..7[87J4LXE..D3.H3F63ZQwX87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH.F63TN.V8.C.m.D..eg&!@fFA56E9U.)Q"6*0.&Vn:F(.Z4qs.k.'_(=kI>N.NH3F63Z9'...;.2t4.MhB.6.eIMe .&3..Ng).:.5.0.B.H.y?IDI.4.o1;.B.M|kH8.B./e1[_fA.&ED3D3NH3F63ZQ7X8..XED3.vNH.G23..7.87J0LXED.D.OC2O63.P7X.6J0LXEk.D3NX3F6.[Q7Xx7J LXEF3D6NH3F63ZT7X87J0LX.G3D7NH.}43XQ7.87Z0LHED3D#NH#F63ZQ7H87J0LXED3D3.]1Ff3ZQ78:7&"MXED3D3NH3F63ZQ7X87J0LXED3..OH/F63ZQ7X87J0LXED3D3NH3F63ZQ7.55JpLXED3D3NH3F6.[Q.Y87J0LXED3D3NH3F63ZQ7X87J0Lv1!K03NH+.73ZA7X8.K0L\ED3D3NH3F63ZQ7x87*.><$0RD3.%3F6.[Q7687J.MXED3D3NH3F63Z.7Xx..Q89ED3..NH3f43ZG7X8=H0LXED3D3NH3F6sZQ.vJD8SLXE(!E3N(1F6'[Q7x:7J0LXED3D3NH3.63.Q7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED3D3NH3F63ZQ7X87J0LXED
                                              Process:C:\Users\user\Desktop\xom6WSISuh.exe
                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                              Category:dropped
                                              Size (bytes):676352
                                              Entropy (8bit):7.941152855925268
                                              Encrypted:false
                                              SSDEEP:12288:esHzOUNUSB/o5LsI1uwajJ5yvv1l2HBx8gR17mmvVNJ1irgLzmgxH:BiUmSB/o5d1ubcvss6YUJ1ikzm4H
                                              MD5:2856D0548E14630F06B915B7FF1D8B55
                                              SHA1:D52DC37084A8FDAE9E90758212B899DA10C5C48B
                                              SHA-256:96FA199B9544B7D2015C33027E5CDFACA3A36A5DE09D6805D7DFB04DFC6F91B2
                                              SHA-512:D2E6A171712D266413747095B51FD44FDE23562D04E908670EA9F04E541D985CC8079E1EE7BF60AD64DB6371341BA646C6A4A45BE1CE9AB964E1E94C54280F97
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 68%
                                              • Antivirus: Virustotal, Detection: 75%, Browse
                                              Reputation:low
                                              Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L...Q^bg.........."...............................@..........................p............@...@.......@......................^..$........~...................b......................................................................................UPX0....................................UPX1................................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................3.91.UPX!....
                                              Process:C:\Users\user\AppData\Local\oxman\gehlenite.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):270
                                              Entropy (8bit):3.389636515611468
                                              Encrypted:false
                                              SSDEEP:6:DMM8lfm3OOQdUfcloRKUEZ+lX1Klhg9BnriIM8lfQVn:DsO+vNloRKQ1OgjmA2n
                                              MD5:2CBE3004B98AB7D049DA99DA07A33575
                                              SHA1:33D752DF805B680F68DB8100912CB7F6A24EC751
                                              SHA-256:4248FF6D5CE0FC12D815D69AEEBC730101853B3F10EA7CCC9A2055171146B35B
                                              SHA-512:FD38F3885524199F85D5BC66D7FA4347F66D6E60FC29B9684D7BD5B817BDA61EF8E6E85423C025EB444BB0D3820517654E5AAE32B5BD0C5367CC5069CC203624
                                              Malicious:true
                                              Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.o.x.m.a.n.\.g.e.h.l.e.n.i.t.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                              Entropy (8bit):7.941152855925268
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.39%
                                              • UPX compressed Win32 Executable (30571/9) 0.30%
                                              • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              File name:xom6WSISuh.exe
                                              File size:676'352 bytes
                                              MD5:2856d0548e14630f06b915b7ff1d8b55
                                              SHA1:d52dc37084a8fdae9e90758212b899da10c5c48b
                                              SHA256:96fa199b9544b7d2015c33027e5cdfaca3a36a5de09d6805d7dfb04dfc6f91b2
                                              SHA512:d2e6a171712d266413747095b51fd44fde23562d04e908670ea9f04e541d985cc8079e1ee7bf60ad64db6371341ba646c6a4a45be1ce9ab964e1e94c54280f97
                                              SSDEEP:12288:esHzOUNUSB/o5LsI1uwajJ5yvv1l2HBx8gR17mmvVNJ1irgLzmgxH:BiUmSB/o5d1ubcvss6YUJ1ikzm4H
                                              TLSH:36E42326A0C0DC59D11273B8803A8EE554617631DE853B758790FBAFB9353C6CA47F2B
                                              File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                              Icon Hash:aaf3e3e3938382a0
                                              Entrypoint:0x52d6f0
                                              Entrypoint Section:UPX1
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x67625E51 [Wed Dec 18 05:32:01 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:5
                                              OS Version Minor:1
                                              File Version Major:5
                                              File Version Minor:1
                                              Subsystem Version Major:5
                                              Subsystem Version Minor:1
                                              Import Hash:21371b611d91188d602926b15db6bd48
                                              Instruction
                                              pushad
                                              mov esi, 004D1000h
                                              lea edi, dword ptr [esi-000D0000h]
                                              push edi
                                              jmp 00007F3E60FEB1EDh
                                              nop
                                              mov al, byte ptr [esi]
                                              inc esi
                                              mov byte ptr [edi], al
                                              inc edi
                                              add ebx, ebx
                                              jne 00007F3E60FEB1E9h
                                              mov ebx, dword ptr [esi]
                                              sub esi, FFFFFFFCh
                                              adc ebx, ebx
                                              jc 00007F3E60FEB1CFh
                                              mov eax, 00000001h
                                              add ebx, ebx
                                              jne 00007F3E60FEB1E9h
                                              mov ebx, dword ptr [esi]
                                              sub esi, FFFFFFFCh
                                              adc ebx, ebx
                                              adc eax, eax
                                              add ebx, ebx
                                              jnc 00007F3E60FEB1EDh
                                              jne 00007F3E60FEB20Ah
                                              mov ebx, dword ptr [esi]
                                              sub esi, FFFFFFFCh
                                              adc ebx, ebx
                                              jc 00007F3E60FEB201h
                                              dec eax
                                              add ebx, ebx
                                              jne 00007F3E60FEB1E9h
                                              mov ebx, dword ptr [esi]
                                              sub esi, FFFFFFFCh
                                              adc ebx, ebx
                                              adc eax, eax
                                              jmp 00007F3E60FEB1B6h
                                              add ebx, ebx
                                              jne 00007F3E60FEB1E9h
                                              mov ebx, dword ptr [esi]
                                              sub esi, FFFFFFFCh
                                              adc ebx, ebx
                                              adc ecx, ecx
                                              jmp 00007F3E60FEB234h
                                              xor ecx, ecx
                                              sub eax, 03h
                                              jc 00007F3E60FEB1F3h
                                              shl eax, 08h
                                              mov al, byte ptr [esi]
                                              inc esi
                                              xor eax, FFFFFFFFh
                                              je 00007F3E60FEB257h
                                              sar eax, 1
                                              mov ebp, eax
                                              jmp 00007F3E60FEB1EDh
                                              add ebx, ebx
                                              jne 00007F3E60FEB1E9h
                                              mov ebx, dword ptr [esi]
                                              sub esi, FFFFFFFCh
                                              adc ebx, ebx
                                              jc 00007F3E60FEB1AEh
                                              inc ecx
                                              add ebx, ebx
                                              jne 00007F3E60FEB1E9h
                                              mov ebx, dword ptr [esi]
                                              sub esi, FFFFFFFCh
                                              adc ebx, ebx
                                              jc 00007F3E60FEB1A0h
                                              add ebx, ebx
                                              jne 00007F3E60FEB1E9h
                                              mov ebx, dword ptr [esi]
                                              sub esi, FFFFFFFCh
                                              adc ebx, ebx
                                              adc ecx, ecx
                                              add ebx, ebx
                                              jnc 00007F3E60FEB1D1h
                                              jne 00007F3E60FEB1EBh
                                              mov ebx, dword ptr [esi]
                                              sub esi, FFFFFFFCh
                                              adc ebx, ebx
                                              jnc 00007F3E60FEB1C6h
                                              add ecx, 02h
                                              cmp ebp, FFFFFB00h
                                              adc ecx, 02h
                                              lea edx, dword ptr [edi+ebp]
                                              cmp ebp, FFFFFFFCh
                                              jbe 00007F3E60FEB1F0h
                                              mov al, byte ptr [edx]
                                              Programming Language:
                                              • [ C ] VS2008 SP1 build 30729
                                              • [IMP] VS2008 SP1 build 30729
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x175eb00x424.rsrc
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x12e0000x47eb0.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1762d40x14.rsrc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x12d8d40x18UPX1
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x12d8f40xa0UPX1
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              UPX00x10000xd00000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              UPX10xd10000x5d0000x5ca0071db6506da5abfc44d5f04ddbf45da2dFalse0.9885000210863698data7.937154572908039IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x12e0000x490000x484002c9d001f7e3a60462a9e411ee6f6f032False0.9294982698961938data7.899536828685614IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0x12e5ac0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                              RT_ICON0x12e6d80x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                              RT_ICON0x12e8040x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                              RT_ICON0x12e9300x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                              RT_ICON0x12ec1c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                              RT_ICON0x12ed480xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                              RT_ICON0x12fbf40x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                              RT_ICON0x1304a00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                              RT_ICON0x130a0c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                              RT_ICON0x132fb80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                              RT_ICON0x1340640x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                              RT_MENU0xda4a00x50dataEnglishGreat Britain1.1375
                                              RT_STRING0xda4f00x594MPEG-4 LOASEnglishGreat Britain1.007703081232493
                                              RT_STRING0xdaa840x68adataEnglishGreat Britain0.9414575866188769
                                              RT_STRING0xdb1100x490dataEnglishGreat Britain0.958904109589041
                                              RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.9301566579634465
                                              RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.9606879606879607
                                              RT_STRING0xdc1f80x466dataEnglishGreat Britain0.9671403197158082
                                              RT_STRING0xdc6600x158OpenPGP Secret KeyEnglishGreat Britain1.0319767441860466
                                              RT_RCDATA0x1344d00x41447data1.0003403968803186
                                              RT_GROUP_ICON0x17591c0x76dataEnglishGreat Britain0.6610169491525424
                                              RT_GROUP_ICON0x1759980x14dataEnglishGreat Britain1.25
                                              RT_GROUP_ICON0x1759b00x14dataEnglishGreat Britain1.15
                                              RT_GROUP_ICON0x1759c80x14dataEnglishGreat Britain1.25
                                              RT_VERSION0x1759e00xdcdataEnglishGreat Britain0.6181818181818182
                                              RT_MANIFEST0x175ac00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                              DLLImport
                                              KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
                                              ADVAPI32.dllGetAce
                                              COMCTL32.dllImageList_Remove
                                              COMDLG32.dllGetSaveFileNameW
                                              GDI32.dllLineTo
                                              IPHLPAPI.DLLIcmpSendEcho
                                              MPR.dllWNetGetConnectionW
                                              ole32.dllCoGetObject
                                              OLEAUT32.dllOleLoadPicture
                                              PSAPI.DLLGetProcessMemoryInfo
                                              SHELL32.dllDragFinish
                                              USER32.dllGetDC
                                              USERENV.dllLoadUserProfileW
                                              UxTheme.dllIsThemeActive
                                              VERSION.dllVerQueryValueW
                                              WININET.dllFtpOpenFileW
                                              WINMM.dlltimeGetTime
                                              WSOCK32.dllconnect
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishGreat Britain
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2025-01-10T18:55:20.572778+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730132.226.8.16980TCP
                                              2025-01-10T18:55:29.589691+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449738132.226.8.16980TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 10, 2025 18:55:10.038738966 CET4973080192.168.2.4132.226.8.169
                                              Jan 10, 2025 18:55:10.043638945 CET8049730132.226.8.169192.168.2.4
                                              Jan 10, 2025 18:55:10.043711901 CET4973080192.168.2.4132.226.8.169
                                              Jan 10, 2025 18:55:10.043976068 CET4973080192.168.2.4132.226.8.169
                                              Jan 10, 2025 18:55:10.048788071 CET8049730132.226.8.169192.168.2.4
                                              Jan 10, 2025 18:55:19.039814949 CET8049730132.226.8.169192.168.2.4
                                              Jan 10, 2025 18:55:19.048337936 CET4973080192.168.2.4132.226.8.169
                                              Jan 10, 2025 18:55:19.053236008 CET8049730132.226.8.169192.168.2.4
                                              Jan 10, 2025 18:55:20.530529022 CET8049730132.226.8.169192.168.2.4
                                              Jan 10, 2025 18:55:20.541591883 CET49732443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:20.541656971 CET44349732104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:20.541719913 CET49732443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:20.572777987 CET4973080192.168.2.4132.226.8.169
                                              Jan 10, 2025 18:55:20.594727993 CET49732443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:20.594769001 CET44349732104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:21.134202957 CET44349732104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:21.134288073 CET49732443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:21.141422033 CET49732443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:21.141463995 CET44349732104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:21.141773939 CET44349732104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:21.182128906 CET49732443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:21.231900930 CET49732443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:21.275338888 CET44349732104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:21.358587980 CET44349732104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:21.358649015 CET44349732104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:21.358709097 CET49732443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:21.465560913 CET49732443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:26.342973948 CET4973880192.168.2.4132.226.8.169
                                              Jan 10, 2025 18:55:26.348361969 CET8049738132.226.8.169192.168.2.4
                                              Jan 10, 2025 18:55:26.348439932 CET4973880192.168.2.4132.226.8.169
                                              Jan 10, 2025 18:55:26.348694086 CET4973880192.168.2.4132.226.8.169
                                              Jan 10, 2025 18:55:26.353497982 CET8049738132.226.8.169192.168.2.4
                                              Jan 10, 2025 18:55:29.247775078 CET8049738132.226.8.169192.168.2.4
                                              Jan 10, 2025 18:55:29.252223969 CET4973880192.168.2.4132.226.8.169
                                              Jan 10, 2025 18:55:29.257157087 CET8049738132.226.8.169192.168.2.4
                                              Jan 10, 2025 18:55:29.539735079 CET8049738132.226.8.169192.168.2.4
                                              Jan 10, 2025 18:55:29.544140100 CET49739443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:29.544176102 CET44349739104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:29.544286013 CET49739443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:29.552287102 CET49739443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:29.552303076 CET44349739104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:29.589690924 CET4973880192.168.2.4132.226.8.169
                                              Jan 10, 2025 18:55:30.061687946 CET44349739104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:30.061784983 CET49739443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:30.063719988 CET49739443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:30.063733101 CET44349739104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:30.064002037 CET44349739104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:30.104403973 CET49739443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:30.111697912 CET49739443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:30.155332088 CET44349739104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:30.228270054 CET44349739104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:30.228329897 CET44349739104.21.112.1192.168.2.4
                                              Jan 10, 2025 18:55:30.228383064 CET49739443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:55:30.231281996 CET49739443192.168.2.4104.21.112.1
                                              Jan 10, 2025 18:56:25.525448084 CET8049730132.226.8.169192.168.2.4
                                              Jan 10, 2025 18:56:25.525509119 CET4973080192.168.2.4132.226.8.169
                                              Jan 10, 2025 18:56:34.538484097 CET8049738132.226.8.169192.168.2.4
                                              Jan 10, 2025 18:56:34.538557053 CET4973880192.168.2.4132.226.8.169
                                              Jan 10, 2025 18:57:00.542088032 CET4973080192.168.2.4132.226.8.169
                                              Jan 10, 2025 18:57:00.547082901 CET8049730132.226.8.169192.168.2.4
                                              Jan 10, 2025 18:57:09.542987108 CET4973880192.168.2.4132.226.8.169
                                              Jan 10, 2025 18:57:09.547789097 CET8049738132.226.8.169192.168.2.4
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 10, 2025 18:55:10.021800995 CET6007853192.168.2.41.1.1.1
                                              Jan 10, 2025 18:55:10.029261112 CET53600781.1.1.1192.168.2.4
                                              Jan 10, 2025 18:55:20.532107115 CET5234953192.168.2.41.1.1.1
                                              Jan 10, 2025 18:55:20.540767908 CET53523491.1.1.1192.168.2.4
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Jan 10, 2025 18:55:10.021800995 CET192.168.2.41.1.1.10xfcecStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:55:20.532107115 CET192.168.2.41.1.1.10xf2a0Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Jan 10, 2025 18:55:10.029261112 CET1.1.1.1192.168.2.40xfcecNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                              Jan 10, 2025 18:55:10.029261112 CET1.1.1.1192.168.2.40xfcecNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:55:10.029261112 CET1.1.1.1192.168.2.40xfcecNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:55:10.029261112 CET1.1.1.1192.168.2.40xfcecNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:55:10.029261112 CET1.1.1.1192.168.2.40xfcecNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:55:10.029261112 CET1.1.1.1192.168.2.40xfcecNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:55:20.540767908 CET1.1.1.1192.168.2.40xf2a0No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:55:20.540767908 CET1.1.1.1192.168.2.40xf2a0No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:55:20.540767908 CET1.1.1.1192.168.2.40xf2a0No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:55:20.540767908 CET1.1.1.1192.168.2.40xf2a0No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:55:20.540767908 CET1.1.1.1192.168.2.40xf2a0No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:55:20.540767908 CET1.1.1.1192.168.2.40xf2a0No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:55:20.540767908 CET1.1.1.1192.168.2.40xf2a0No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                              • reallyfreegeoip.org
                                              • checkip.dyndns.org
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.449730132.226.8.169805076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:55:10.043976068 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Jan 10, 2025 18:55:19.039814949 CET273INHTTP/1.1 200 OK
                                              Date: Fri, 10 Jan 2025 17:55:18 GMT
                                              Content-Type: text/html
                                              Content-Length: 104
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                              Jan 10, 2025 18:55:19.048337936 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Jan 10, 2025 18:55:20.530529022 CET273INHTTP/1.1 200 OK
                                              Date: Fri, 10 Jan 2025 17:55:20 GMT
                                              Content-Type: text/html
                                              Content-Length: 104
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.449738132.226.8.169803332C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:55:26.348694086 CET151OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Connection: Keep-Alive
                                              Jan 10, 2025 18:55:29.247775078 CET273INHTTP/1.1 200 OK
                                              Date: Fri, 10 Jan 2025 17:55:29 GMT
                                              Content-Type: text/html
                                              Content-Length: 104
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                              Jan 10, 2025 18:55:29.252223969 CET127OUTGET / HTTP/1.1
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                              Host: checkip.dyndns.org
                                              Jan 10, 2025 18:55:29.539735079 CET273INHTTP/1.1 200 OK
                                              Date: Fri, 10 Jan 2025 17:55:29 GMT
                                              Content-Type: text/html
                                              Content-Length: 104
                                              Connection: keep-alive
                                              Cache-Control: no-cache
                                              Pragma: no-cache
                                              Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.449732104.21.112.14435076C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2025-01-10 17:55:21 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2025-01-10 17:55:21 UTC853INHTTP/1.1 200 OK
                                              Date: Fri, 10 Jan 2025 17:55:21 GMT
                                              Content-Type: text/xml
                                              Content-Length: 362
                                              Connection: close
                                              Age: 1846510
                                              Cache-Control: max-age=31536000
                                              cf-cache-status: HIT
                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1%2BRxuojfnDqAiFL1Jg%2FCbMuk9XebQ03cqr7Op4fx590OXQfk3cd3teIINIAAMBjLucoRMKVUBFBvWdIyf8XmBurPlbcYbJ1IoVfJodpYscefLZzKSwtmpnfZn6XZ6oPGENAsXhrw"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8ffe899a0a9a424b-EWR
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=1834&min_rtt=1805&rtt_var=736&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1429970&cwnd=248&unsent_bytes=0&cid=f3761747a124ba91&ts=237&x=0"
                                              2025-01-10 17:55:21 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.449739104.21.112.14433332C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              TimestampBytes transferredDirectionData
                                              2025-01-10 17:55:30 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                              Host: reallyfreegeoip.org
                                              Connection: Keep-Alive
                                              2025-01-10 17:55:30 UTC853INHTTP/1.1 200 OK
                                              Date: Fri, 10 Jan 2025 17:55:30 GMT
                                              Content-Type: text/xml
                                              Content-Length: 362
                                              Connection: close
                                              Age: 1846519
                                              Cache-Control: max-age=31536000
                                              cf-cache-status: HIT
                                              last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Tm4k8r%2F4Val8NBnNirDe2EsTqTeHs5FfqKCWimHXHX0aEoby%2BOugQUjx7Rh11rx5wb80RiIJmXUfudoL0FjzyNTKrYa80ED0ijrBGfedmHB3nxQujaby0JswIRTnSYYObGl6QFLg"}],"group":"cf-nel","max_age":604800}
                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                              Server: cloudflare
                                              CF-RAY: 8ffe89d18b0c727b-EWR
                                              alt-svc: h3=":443"; ma=86400
                                              server-timing: cfL4;desc="?proto=TCP&rtt=2051&min_rtt=2042&rtt_var=772&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1429970&cwnd=234&unsent_bytes=0&cid=76dd314a791de529&ts=174&x=0"
                                              2025-01-10 17:55:30 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                              Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:12:55:02
                                              Start date:10/01/2025
                                              Path:C:\Users\user\Desktop\xom6WSISuh.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\xom6WSISuh.exe"
                                              Imagebase:0xc0000
                                              File size:676'352 bytes
                                              MD5 hash:2856D0548E14630F06B915B7FF1D8B55
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:1
                                              Start time:12:55:06
                                              Start date:10/01/2025
                                              Path:C:\Users\user\AppData\Local\oxman\gehlenite.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\xom6WSISuh.exe"
                                              Imagebase:0x570000
                                              File size:676'352 bytes
                                              MD5 hash:2856D0548E14630F06B915B7FF1D8B55
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000001.00000002.1775907851.0000000000AF0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                              Antivirus matches:
                                              • Detection: 100%, Joe Sandbox ML
                                              • Detection: 68%, ReversingLabs
                                              • Detection: 75%, Virustotal, Browse
                                              Reputation:low
                                              Has exited:true

                                              Target ID:2
                                              Start time:12:55:08
                                              Start date:10/01/2025
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\xom6WSISuh.exe"
                                              Imagebase:0xac0000
                                              File size:45'984 bytes
                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000002.00000002.2986492274.0000000003090000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2986125435.0000000002BF0000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2986816837.00000000032A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, Author: unknown
                                              • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000002.00000002.2989627602.0000000005570000.00000004.08000000.00040000.00000000.sdmp, Author: Florian Roth
                                              Reputation:high
                                              Has exited:false

                                              Target ID:4
                                              Start time:12:55:19
                                              Start date:10/01/2025
                                              Path:C:\Windows\System32\wscript.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\gehlenite.vbs"
                                              Imagebase:0x7ff60c9a0000
                                              File size:170'496 bytes
                                              MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:5
                                              Start time:12:55:20
                                              Start date:10/01/2025
                                              Path:C:\Users\user\AppData\Local\oxman\gehlenite.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Local\oxman\gehlenite.exe"
                                              Imagebase:0x570000
                                              File size:676'352 bytes
                                              MD5 hash:2856D0548E14630F06B915B7FF1D8B55
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000005.00000002.1940996077.00000000035C0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                              Reputation:low
                                              Has exited:true

                                              Target ID:8
                                              Start time:12:55:24
                                              Start date:10/01/2025
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Local\oxman\gehlenite.exe"
                                              Imagebase:0xdd0000
                                              File size:45'984 bytes
                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000008.00000002.2988556410.0000000004411000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.2986752366.00000000035A0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:high
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:2.9%
                                                Dynamic/Decrypted Code Coverage:0.9%
                                                Signature Coverage:4.8%
                                                Total number of Nodes:1953
                                                Total number of Limit Nodes:72
                                                execution_graph 96916 c1cad SystemParametersInfoW 96917 113f75 96928 dceb1 96917->96928 96919 113f8b 96920 114006 96919->96920 96995 de300 23 API calls 96919->96995 96937 cbf40 96920->96937 96923 114052 96927 114a88 96923->96927 96997 13359c 82 API calls __wsopen_s 96923->96997 96925 113fe6 96925->96923 96996 131abf 22 API calls 96925->96996 96929 dcebf 96928->96929 96930 dced2 96928->96930 96998 caceb 23 API calls ISource 96929->96998 96931 dcf05 96930->96931 96932 dced7 96930->96932 97009 caceb 23 API calls ISource 96931->97009 96999 dfddb 96932->96999 96936 dcec9 96936->96919 97022 cadf0 96937->97022 96939 cbf9d 96940 cbfa9 96939->96940 96941 1104b6 96939->96941 96943 cc01e 96940->96943 96944 1104c6 96940->96944 97051 13359c 82 API calls __wsopen_s 96941->97051 97027 cac91 96943->97027 97052 13359c 82 API calls __wsopen_s 96944->97052 96947 cc603 96947->96923 96948 cc7da 97040 dfe0b 96948->97040 96949 127120 22 API calls 96978 cc039 ISource __fread_nolock 96949->96978 96951 dfddb 22 API calls 96951->96978 96956 1104f5 96960 11055a 96956->96960 97053 dd217 235 API calls 96956->97053 96959 cc808 __fread_nolock 96964 dfe0b 22 API calls 96959->96964 96960->96947 97054 13359c 82 API calls __wsopen_s 96960->97054 96961 cec40 235 API calls 96961->96978 96962 caf8a 22 API calls 96962->96978 96963 11091a 97088 133209 23 API calls 96963->97088 96967 cc350 ISource __fread_nolock 96964->96967 96979 cc3ac 96967->96979 97050 dce17 22 API calls ISource 96967->97050 96968 1108a5 97062 cec40 96968->97062 96971 1108cf 96971->96947 97086 ca81b 41 API calls 96971->97086 96972 110591 97055 13359c 82 API calls __wsopen_s 96972->97055 96975 1108f6 97087 13359c 82 API calls __wsopen_s 96975->97087 96978->96947 96978->96948 96978->96949 96978->96951 96978->96956 96978->96959 96978->96960 96978->96961 96978->96962 96978->96963 96978->96968 96978->96972 96978->96975 96981 cc237 96978->96981 96983 dfe0b 22 API calls 96978->96983 96990 1109bf 96978->96990 96992 cbbe0 40 API calls 96978->96992 97031 cad81 96978->97031 97056 127099 22 API calls __fread_nolock 96978->97056 97057 145745 54 API calls _wcslen 96978->97057 97058 daa42 22 API calls ISource 96978->97058 97059 12f05c 40 API calls 96978->97059 97060 ca993 41 API calls 96978->97060 97061 caceb 23 API calls ISource 96978->97061 96979->96923 96982 cc253 96981->96982 97089 ca8c7 96981->97089 96985 110976 96982->96985 96988 cc297 ISource 96982->96988 96983->96978 97093 caceb 23 API calls ISource 96985->97093 96988->96990 97038 caceb 23 API calls ISource 96988->97038 96990->96947 97094 13359c 82 API calls __wsopen_s 96990->97094 96991 cc335 96991->96990 96993 cc342 96991->96993 96992->96978 97039 ca704 22 API calls ISource 96993->97039 96995->96925 96996->96920 96997->96927 96998->96936 97002 dfde0 96999->97002 97001 dfdfa 97001->96936 97002->97001 97004 dfdfc 97002->97004 97010 eea0c 97002->97010 97017 e4ead 7 API calls 2 library calls 97002->97017 97005 e066d 97004->97005 97018 e32a4 RaiseException 97004->97018 97019 e32a4 RaiseException 97005->97019 97007 e068a 97007->96936 97009->96936 97016 f3820 _abort 97010->97016 97011 f385e 97021 ef2d9 20 API calls _abort 97011->97021 97013 f3849 RtlAllocateHeap 97014 f385c 97013->97014 97013->97016 97014->97002 97016->97011 97016->97013 97020 e4ead 7 API calls 2 library calls 97016->97020 97017->97002 97018->97005 97019->97007 97020->97016 97021->97014 97023 cae01 97022->97023 97026 cae1c ISource 97022->97026 97095 caec9 97023->97095 97025 cae09 CharUpperBuffW 97025->97026 97026->96939 97028 cacae 97027->97028 97029 cacd1 97028->97029 97101 13359c 82 API calls __wsopen_s 97028->97101 97029->96978 97032 10fadb 97031->97032 97033 cad92 97031->97033 97034 dfddb 22 API calls 97033->97034 97035 cad99 97034->97035 97102 cadcd 97035->97102 97038->96991 97039->96967 97043 dfddb 97040->97043 97041 eea0c ___std_exception_copy 21 API calls 97041->97043 97042 dfdfa 97042->96959 97043->97041 97043->97042 97045 dfdfc 97043->97045 97114 e4ead 7 API calls 2 library calls 97043->97114 97049 e066d 97045->97049 97115 e32a4 RaiseException 97045->97115 97047 e068a 97047->96959 97116 e32a4 RaiseException 97049->97116 97050->96967 97051->96944 97052->96947 97053->96960 97054->96947 97055->96947 97056->96978 97057->96978 97058->96978 97059->96978 97060->96978 97061->96978 97083 cec76 ISource 97062->97083 97063 e00a3 29 API calls pre_c_initialization 97063->97083 97064 cfef7 97070 ca8c7 22 API calls 97064->97070 97077 ced9d ISource 97064->97077 97067 dfddb 22 API calls 97067->97083 97068 114600 97074 ca8c7 22 API calls 97068->97074 97068->97077 97069 114b0b 97120 13359c 82 API calls __wsopen_s 97069->97120 97070->97077 97073 ca8c7 22 API calls 97073->97083 97074->97077 97076 e0242 RtlEnterCriticalSection RtlLeaveCriticalSection RtlLeaveCriticalSection WaitForSingleObjectEx RtlEnterCriticalSection 97076->97083 97077->96971 97078 cfbe3 97078->97077 97080 114bdc 97078->97080 97085 cf3ae ISource 97078->97085 97079 ca961 22 API calls 97079->97083 97121 13359c 82 API calls __wsopen_s 97080->97121 97082 114beb 97122 13359c 82 API calls __wsopen_s 97082->97122 97083->97063 97083->97064 97083->97067 97083->97068 97083->97069 97083->97073 97083->97076 97083->97077 97083->97078 97083->97079 97083->97082 97084 e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97083->97084 97083->97085 97117 d01e0 235 API calls 2 library calls 97083->97117 97118 d06a0 41 API calls ISource 97083->97118 97084->97083 97085->97077 97119 13359c 82 API calls __wsopen_s 97085->97119 97086->96975 97087->96947 97088->96981 97090 ca8db 97089->97090 97092 ca8ea __fread_nolock 97089->97092 97091 dfe0b 22 API calls 97090->97091 97090->97092 97091->97092 97092->96982 97093->96990 97094->96947 97096 caedc 97095->97096 97097 caed9 __fread_nolock 97095->97097 97098 dfddb 22 API calls 97096->97098 97097->97025 97099 caee7 97098->97099 97100 dfe0b 22 API calls 97099->97100 97100->97097 97101->97029 97108 caddd 97102->97108 97103 cadb6 97103->96978 97104 dfddb 22 API calls 97104->97108 97106 cadcd 22 API calls 97106->97108 97107 ca8c7 22 API calls 97107->97108 97108->97103 97108->97104 97108->97106 97108->97107 97109 ca961 97108->97109 97110 dfe0b 22 API calls 97109->97110 97111 ca976 97110->97111 97112 dfddb 22 API calls 97111->97112 97113 ca984 97112->97113 97113->97108 97114->97043 97115->97049 97116->97047 97117->97083 97118->97083 97119->97077 97120->97077 97121->97082 97122->97077 97123 be7738 97137 be5388 97123->97137 97125 be77f8 97140 be7628 97125->97140 97127 be7821 CreateFileW 97129 be7875 97127->97129 97130 be7870 97127->97130 97129->97130 97131 be788c VirtualAlloc 97129->97131 97131->97130 97132 be78ad ReadFile 97131->97132 97132->97130 97133 be78c8 97132->97133 97134 be63f8 12 API calls 97133->97134 97135 be78e2 97134->97135 97136 be6628 GetPEB GetPEB 97135->97136 97136->97130 97143 be8838 GetPEB 97137->97143 97139 be5a13 97139->97125 97141 be7631 Sleep 97140->97141 97142 be763f 97141->97142 97144 be8862 97143->97144 97144->97139 97145 c1044 97150 c10f3 97145->97150 97147 c104a 97186 e00a3 29 API calls __onexit 97147->97186 97149 c1054 97187 c1398 97150->97187 97154 c116a 97155 ca961 22 API calls 97154->97155 97156 c1174 97155->97156 97157 ca961 22 API calls 97156->97157 97158 c117e 97157->97158 97159 ca961 22 API calls 97158->97159 97160 c1188 97159->97160 97161 ca961 22 API calls 97160->97161 97162 c11c6 97161->97162 97163 ca961 22 API calls 97162->97163 97164 c1292 97163->97164 97197 c171c 97164->97197 97168 c12c4 97169 ca961 22 API calls 97168->97169 97170 c12ce 97169->97170 97218 d1940 97170->97218 97172 c12f9 97228 c1aab 97172->97228 97174 c1315 97175 c1325 GetStdHandle 97174->97175 97176 102485 97175->97176 97177 c137a 97175->97177 97176->97177 97178 10248e 97176->97178 97180 c1387 OleInitialize 97177->97180 97179 dfddb 22 API calls 97178->97179 97181 102495 97179->97181 97180->97147 97235 13011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97181->97235 97183 10249e 97236 130944 CreateThread 97183->97236 97185 1024aa CloseHandle 97185->97177 97186->97149 97237 c13f1 97187->97237 97190 c13f1 22 API calls 97191 c13d0 97190->97191 97192 ca961 22 API calls 97191->97192 97193 c13dc 97192->97193 97244 c6b57 97193->97244 97195 c1129 97196 c1bc3 6 API calls 97195->97196 97196->97154 97198 ca961 22 API calls 97197->97198 97199 c172c 97198->97199 97200 ca961 22 API calls 97199->97200 97201 c1734 97200->97201 97202 ca961 22 API calls 97201->97202 97203 c174f 97202->97203 97204 dfddb 22 API calls 97203->97204 97205 c129c 97204->97205 97206 c1b4a 97205->97206 97207 c1b58 97206->97207 97208 ca961 22 API calls 97207->97208 97209 c1b63 97208->97209 97210 ca961 22 API calls 97209->97210 97211 c1b6e 97210->97211 97212 ca961 22 API calls 97211->97212 97213 c1b79 97212->97213 97214 ca961 22 API calls 97213->97214 97215 c1b84 97214->97215 97216 dfddb 22 API calls 97215->97216 97217 c1b96 RegisterClipboardFormatW 97216->97217 97217->97168 97219 d1981 97218->97219 97224 d195d 97218->97224 97264 e0242 5 API calls __Init_thread_wait 97219->97264 97222 d198b 97222->97224 97265 e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent 97222->97265 97223 d8727 97227 d196e 97223->97227 97267 e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent 97223->97267 97224->97227 97266 e0242 5 API calls __Init_thread_wait 97224->97266 97227->97172 97229 c1abb 97228->97229 97230 10272d 97228->97230 97232 dfddb 22 API calls 97229->97232 97268 133209 23 API calls 97230->97268 97234 c1ac3 97232->97234 97233 102738 97234->97174 97235->97183 97236->97185 97269 13092a 28 API calls 97236->97269 97238 ca961 22 API calls 97237->97238 97239 c13fc 97238->97239 97240 ca961 22 API calls 97239->97240 97241 c1404 97240->97241 97242 ca961 22 API calls 97241->97242 97243 c13c6 97242->97243 97243->97190 97245 104ba1 97244->97245 97246 c6b67 _wcslen 97244->97246 97260 c93b2 97245->97260 97249 c6b7d 97246->97249 97250 c6ba2 97246->97250 97248 104baa 97248->97248 97256 c6f34 97249->97256 97251 dfddb 22 API calls 97250->97251 97253 c6bae 97251->97253 97255 dfe0b 22 API calls 97253->97255 97254 c6b85 __fread_nolock 97254->97195 97255->97254 97257 c6f46 97256->97257 97258 c6f4c 97256->97258 97257->97254 97259 dfe0b 22 API calls 97258->97259 97259->97257 97261 c93c0 97260->97261 97263 c93c9 __fread_nolock 97260->97263 97262 caec9 22 API calls 97261->97262 97261->97263 97262->97263 97263->97248 97264->97222 97265->97224 97266->97223 97267->97227 97268->97233 97270 f8402 97275 f81be 97270->97275 97273 f842a 97280 f81ef try_get_first_available_module 97275->97280 97277 f83ee 97294 f27ec 26 API calls _abort 97277->97294 97279 f8343 97279->97273 97287 100984 97279->97287 97280->97280 97283 f8338 97280->97283 97290 e8e0b 40 API calls 2 library calls 97280->97290 97282 f838c 97282->97283 97291 e8e0b 40 API calls 2 library calls 97282->97291 97283->97279 97293 ef2d9 20 API calls _abort 97283->97293 97285 f83ab 97285->97283 97292 e8e0b 40 API calls 2 library calls 97285->97292 97295 100081 97287->97295 97289 10099f 97289->97273 97290->97282 97291->97285 97292->97283 97293->97277 97294->97279 97298 10008d ___BuildCatchObject 97295->97298 97296 10009b 97352 ef2d9 20 API calls _abort 97296->97352 97298->97296 97300 1000d4 97298->97300 97299 1000a0 97353 f27ec 26 API calls _abort 97299->97353 97306 10065b 97300->97306 97305 1000aa __fread_nolock 97305->97289 97307 100678 97306->97307 97308 1006a6 97307->97308 97309 10068d 97307->97309 97355 f5221 97308->97355 97369 ef2c6 20 API calls _abort 97309->97369 97312 1006ab 97314 1006b4 97312->97314 97315 1006cb 97312->97315 97313 100692 97370 ef2d9 20 API calls _abort 97313->97370 97371 ef2c6 20 API calls _abort 97314->97371 97368 10039a CreateFileW 97315->97368 97319 1006b9 97372 ef2d9 20 API calls _abort 97319->97372 97321 100781 GetFileType 97322 10078c GetLastError 97321->97322 97328 1007d3 97321->97328 97375 ef2a3 20 API calls __dosmaperr 97322->97375 97323 100756 GetLastError 97374 ef2a3 20 API calls __dosmaperr 97323->97374 97326 100704 97326->97321 97326->97323 97373 10039a CreateFileW 97326->97373 97327 10079a CloseHandle 97327->97313 97330 1007c3 97327->97330 97377 f516a 21 API calls 2 library calls 97328->97377 97376 ef2d9 20 API calls _abort 97330->97376 97332 100749 97332->97321 97332->97323 97333 1007f4 97335 100840 97333->97335 97378 1005ab 72 API calls 3 library calls 97333->97378 97340 10086d 97335->97340 97379 10014d 72 API calls 4 library calls 97335->97379 97336 1007c8 97336->97313 97339 100866 97339->97340 97341 10087e 97339->97341 97380 f86ae 97340->97380 97343 1000f8 97341->97343 97344 1008fc CloseHandle 97341->97344 97354 100121 RtlLeaveCriticalSection __wsopen_s 97343->97354 97395 10039a CreateFileW 97344->97395 97346 100927 97347 100931 GetLastError 97346->97347 97348 10095d 97346->97348 97396 ef2a3 20 API calls __dosmaperr 97347->97396 97348->97343 97350 10093d 97397 f5333 21 API calls 2 library calls 97350->97397 97352->97299 97353->97305 97354->97305 97356 f522d ___BuildCatchObject 97355->97356 97398 f2f5e RtlEnterCriticalSection 97356->97398 97358 f5234 97359 f5259 97358->97359 97364 f52c7 RtlEnterCriticalSection 97358->97364 97367 f527b 97358->97367 97402 f5000 21 API calls 3 library calls 97359->97402 97362 f52a4 __fread_nolock 97362->97312 97363 f525e 97363->97367 97403 f5147 RtlEnterCriticalSection 97363->97403 97365 f52d4 RtlLeaveCriticalSection 97364->97365 97364->97367 97365->97358 97399 f532a 97367->97399 97368->97326 97369->97313 97370->97343 97371->97319 97372->97313 97373->97332 97374->97313 97375->97327 97376->97336 97377->97333 97378->97335 97379->97339 97405 f53c4 97380->97405 97382 f86c4 97418 f5333 21 API calls 2 library calls 97382->97418 97383 f86f6 97383->97382 97387 f53c4 __wsopen_s 26 API calls 97383->97387 97384 f86be 97384->97382 97384->97383 97386 f53c4 __wsopen_s 26 API calls 97384->97386 97389 f86ed 97386->97389 97390 f8702 CloseHandle 97387->97390 97388 f871c 97391 f873e 97388->97391 97419 ef2a3 20 API calls __dosmaperr 97388->97419 97392 f53c4 __wsopen_s 26 API calls 97389->97392 97390->97382 97393 f870e GetLastError 97390->97393 97391->97343 97392->97383 97393->97382 97395->97346 97396->97350 97397->97348 97398->97358 97404 f2fa6 RtlLeaveCriticalSection 97399->97404 97401 f5331 97401->97362 97402->97363 97403->97367 97404->97401 97406 f53e6 97405->97406 97407 f53d1 97405->97407 97411 f540b 97406->97411 97422 ef2c6 20 API calls _abort 97406->97422 97420 ef2c6 20 API calls _abort 97407->97420 97410 f53d6 97421 ef2d9 20 API calls _abort 97410->97421 97411->97384 97412 f5416 97423 ef2d9 20 API calls _abort 97412->97423 97415 f53de 97415->97384 97416 f541e 97424 f27ec 26 API calls _abort 97416->97424 97418->97388 97419->97391 97420->97410 97421->97415 97422->97412 97423->97416 97424->97415 97425 1ed6f0 97426 1ed700 97425->97426 97427 1ed81a LoadLibraryA 97426->97427 97430 1ed85f VirtualProtect VirtualProtect 97426->97430 97428 1ed831 97427->97428 97428->97426 97432 1ed843 GetProcAddress 97428->97432 97431 1ed8c4 97430->97431 97431->97431 97432->97428 97433 1ed859 ExitProcess 97432->97433 97434 c2de3 97435 c2df0 __wsopen_s 97434->97435 97436 c2e09 97435->97436 97440 102c2b ___scrt_fastfail 97435->97440 97448 c3aa2 97436->97448 97443 c6b57 22 API calls 97440->97443 97445 102cab 97443->97445 97444 c2e27 97476 c44a8 97444->97476 97445->97445 97506 101f50 97448->97506 97451 c3ace 97454 c6b57 22 API calls 97451->97454 97452 c3ae9 97512 ca6c3 97452->97512 97455 c3ada 97454->97455 97508 c37a0 97455->97508 97458 c2da5 97459 101f50 __wsopen_s 97458->97459 97460 c2db2 GetLongPathNameW 97459->97460 97461 c6b57 22 API calls 97460->97461 97462 c2dda 97461->97462 97463 c3598 97462->97463 97464 ca961 22 API calls 97463->97464 97465 c35aa 97464->97465 97466 c3aa2 23 API calls 97465->97466 97467 c35b5 97466->97467 97468 1032eb 97467->97468 97469 c35c0 97467->97469 97474 10330d 97468->97474 97530 dce60 41 API calls 97468->97530 97518 c515f 97469->97518 97475 c35df 97475->97444 97531 c4ecb 97476->97531 97479 103833 97553 132cf9 97479->97553 97481 c4ecb 94 API calls 97483 c44e1 97481->97483 97482 103848 97484 103869 97482->97484 97485 10384c 97482->97485 97483->97479 97486 c44e9 97483->97486 97490 dfe0b 22 API calls 97484->97490 97594 c4f39 97485->97594 97487 103854 97486->97487 97488 c44f5 97486->97488 97600 12da5a 82 API calls 97487->97600 97593 c940c 136 API calls 2 library calls 97488->97593 97503 1038ae 97490->97503 97493 c2e31 97494 103862 97494->97484 97495 103a5f 97500 103a67 97495->97500 97496 c4f39 68 API calls 97496->97500 97500->97496 97604 12989b 82 API calls __wsopen_s 97500->97604 97502 c9cb3 22 API calls 97502->97503 97503->97495 97503->97500 97503->97502 97579 ca4a1 97503->97579 97587 c3ff7 97503->97587 97601 12967e 22 API calls __fread_nolock 97503->97601 97602 1295ad 42 API calls _wcslen 97503->97602 97603 130b5a 22 API calls 97503->97603 97507 c3aaf GetFullPathNameW 97506->97507 97507->97451 97507->97452 97509 c37ae 97508->97509 97510 c93b2 22 API calls 97509->97510 97511 c2e12 97510->97511 97511->97458 97513 ca6dd 97512->97513 97514 ca6d0 97512->97514 97515 dfddb 22 API calls 97513->97515 97514->97455 97516 ca6e7 97515->97516 97517 dfe0b 22 API calls 97516->97517 97517->97514 97519 c516e 97518->97519 97523 c518f __fread_nolock 97518->97523 97521 dfe0b 22 API calls 97519->97521 97520 dfddb 22 API calls 97522 c35cc 97520->97522 97521->97523 97524 c35f3 97522->97524 97523->97520 97525 c3605 97524->97525 97529 c3624 __fread_nolock 97524->97529 97527 dfe0b 22 API calls 97525->97527 97526 dfddb 22 API calls 97528 c363b 97526->97528 97527->97529 97528->97475 97529->97526 97530->97468 97605 c4e90 LoadLibraryA 97531->97605 97536 c4ef6 LoadLibraryExW 97613 c4e59 LoadLibraryA 97536->97613 97537 103ccf 97539 c4f39 68 API calls 97537->97539 97541 103cd6 97539->97541 97543 c4e59 3 API calls 97541->97543 97544 103cde 97543->97544 97635 c50f5 97544->97635 97545 c4f20 97545->97544 97546 c4f2c 97545->97546 97548 c4f39 68 API calls 97546->97548 97550 c44cd 97548->97550 97550->97479 97550->97481 97552 103d05 97554 132d15 97553->97554 97555 c511f 64 API calls 97554->97555 97556 132d29 97555->97556 97898 132e66 97556->97898 97559 c50f5 40 API calls 97560 132d56 97559->97560 97561 c50f5 40 API calls 97560->97561 97562 132d66 97561->97562 97563 c50f5 40 API calls 97562->97563 97564 132d81 97563->97564 97565 c50f5 40 API calls 97564->97565 97566 132d9c 97565->97566 97567 c511f 64 API calls 97566->97567 97568 132db3 97567->97568 97569 eea0c ___std_exception_copy 21 API calls 97568->97569 97570 132dba 97569->97570 97571 eea0c ___std_exception_copy 21 API calls 97570->97571 97572 132dc4 97571->97572 97573 c50f5 40 API calls 97572->97573 97574 132dd8 97573->97574 97575 1328fe 27 API calls 97574->97575 97576 132dee 97575->97576 97577 132d3f 97576->97577 97904 1322ce 97576->97904 97577->97482 97580 ca52b 97579->97580 97581 ca4b1 __fread_nolock 97579->97581 97583 dfe0b 22 API calls 97580->97583 97582 dfddb 22 API calls 97581->97582 97584 ca4b8 97582->97584 97583->97581 97585 ca4d6 97584->97585 97586 dfddb 22 API calls 97584->97586 97585->97503 97586->97585 97588 c40ae 97587->97588 97590 c400a 97587->97590 97588->97503 97589 c403c 97589->97588 97592 dfddb 22 API calls 97589->97592 97590->97589 97591 dfe0b 22 API calls 97590->97591 97591->97589 97592->97589 97593->97493 97595 c4f43 97594->97595 97597 c4f4a 97594->97597 97596 ee678 67 API calls 97595->97596 97596->97597 97598 c4f59 97597->97598 97599 c4f6a FreeLibrary 97597->97599 97598->97487 97599->97598 97600->97494 97601->97503 97602->97503 97603->97503 97604->97500 97606 c4ea8 GetProcAddress 97605->97606 97607 c4ec6 97605->97607 97608 c4eb8 97606->97608 97610 ee5eb 97607->97610 97608->97607 97609 c4ebf FreeLibrary 97608->97609 97609->97607 97643 ee52a 97610->97643 97612 c4eea 97612->97536 97612->97537 97614 c4e8d 97613->97614 97615 c4e6e GetProcAddress 97613->97615 97618 c4f80 97614->97618 97616 c4e7e 97615->97616 97616->97614 97617 c4e86 FreeLibrary 97616->97617 97617->97614 97619 dfe0b 22 API calls 97618->97619 97620 c4f95 97619->97620 97703 c5722 97620->97703 97622 c4fa1 __fread_nolock 97623 c50a5 97622->97623 97624 103d1d 97622->97624 97634 c4fdc 97622->97634 97706 c42a2 CreateStreamOnHGlobal 97623->97706 97717 13304d 74 API calls 97624->97717 97627 103d22 97629 c511f 64 API calls 97627->97629 97628 c50f5 40 API calls 97628->97634 97630 103d45 97629->97630 97631 c50f5 40 API calls 97630->97631 97632 c506e ISource 97631->97632 97632->97545 97634->97627 97634->97628 97634->97632 97712 c511f 97634->97712 97636 c5107 97635->97636 97638 103d70 97635->97638 97739 ee8c4 97636->97739 97640 1328fe 97881 13274e 97640->97881 97642 132919 97642->97552 97645 ee536 ___BuildCatchObject 97643->97645 97644 ee544 97668 ef2d9 20 API calls _abort 97644->97668 97645->97644 97647 ee574 97645->97647 97650 ee579 97647->97650 97651 ee586 97647->97651 97648 ee549 97669 f27ec 26 API calls _abort 97648->97669 97670 ef2d9 20 API calls _abort 97650->97670 97660 f8061 97651->97660 97654 ee58f 97655 ee595 97654->97655 97656 ee5a2 97654->97656 97671 ef2d9 20 API calls _abort 97655->97671 97672 ee5d4 RtlLeaveCriticalSection __fread_nolock 97656->97672 97657 ee554 __fread_nolock 97657->97612 97661 f806d ___BuildCatchObject 97660->97661 97673 f2f5e RtlEnterCriticalSection 97661->97673 97663 f807b 97674 f80fb 97663->97674 97667 f80ac __fread_nolock 97667->97654 97668->97648 97669->97657 97670->97657 97671->97657 97672->97657 97673->97663 97682 f811e 97674->97682 97675 f8177 97692 f4c7d 20 API calls 2 library calls 97675->97692 97677 f8180 97693 f29c8 97677->97693 97680 f8189 97683 f8088 97680->97683 97699 f3405 11 API calls 2 library calls 97680->97699 97682->97675 97682->97683 97690 e918d RtlEnterCriticalSection 97682->97690 97691 e91a1 RtlLeaveCriticalSection 97682->97691 97687 f80b7 97683->97687 97684 f81a8 97700 e918d RtlEnterCriticalSection 97684->97700 97702 f2fa6 RtlLeaveCriticalSection 97687->97702 97689 f80be 97689->97667 97690->97682 97691->97682 97692->97677 97694 f29d3 RtlFreeHeap 97693->97694 97695 f29fc __dosmaperr 97693->97695 97694->97695 97696 f29e8 97694->97696 97695->97680 97701 ef2d9 20 API calls _abort 97696->97701 97698 f29ee GetLastError 97698->97695 97699->97684 97700->97683 97701->97698 97702->97689 97704 dfddb 22 API calls 97703->97704 97705 c5734 97704->97705 97705->97622 97707 c42bc FindResourceExW 97706->97707 97708 c42d9 97706->97708 97707->97708 97709 1035ba LoadResource 97707->97709 97708->97634 97709->97708 97710 1035cf SizeofResource 97709->97710 97710->97708 97711 1035e3 LockResource 97710->97711 97711->97708 97713 103d90 97712->97713 97714 c512e 97712->97714 97718 eece3 97714->97718 97717->97627 97721 eeaaa 97718->97721 97720 c513c 97720->97634 97722 eeab6 ___BuildCatchObject 97721->97722 97723 eeac2 97722->97723 97724 eeae8 97722->97724 97734 ef2d9 20 API calls _abort 97723->97734 97736 e918d RtlEnterCriticalSection 97724->97736 97727 eeac7 97735 f27ec 26 API calls _abort 97727->97735 97728 eeaf4 97737 eec0a 62 API calls 2 library calls 97728->97737 97731 eeb08 97738 eeb27 RtlLeaveCriticalSection __fread_nolock 97731->97738 97733 eead2 __fread_nolock 97733->97720 97734->97727 97735->97733 97736->97728 97737->97731 97738->97733 97742 ee8e1 97739->97742 97741 c5118 97741->97640 97743 ee8ed ___BuildCatchObject 97742->97743 97744 ee92d 97743->97744 97745 ee900 ___scrt_fastfail 97743->97745 97746 ee925 __fread_nolock 97743->97746 97755 e918d RtlEnterCriticalSection 97744->97755 97769 ef2d9 20 API calls _abort 97745->97769 97746->97741 97749 ee937 97756 ee6f8 97749->97756 97750 ee91a 97770 f27ec 26 API calls _abort 97750->97770 97755->97749 97757 ee70a ___scrt_fastfail 97756->97757 97762 ee727 97756->97762 97758 ee717 97757->97758 97757->97762 97767 ee76a __fread_nolock 97757->97767 97844 ef2d9 20 API calls _abort 97758->97844 97760 ee71c 97845 f27ec 26 API calls _abort 97760->97845 97771 ee96c RtlLeaveCriticalSection __fread_nolock 97762->97771 97763 ee886 ___scrt_fastfail 97847 ef2d9 20 API calls _abort 97763->97847 97767->97762 97767->97763 97772 ed955 97767->97772 97779 f8d45 97767->97779 97846 ecf78 26 API calls 4 library calls 97767->97846 97769->97750 97770->97746 97771->97746 97773 ed976 97772->97773 97774 ed961 97772->97774 97773->97767 97848 ef2d9 20 API calls _abort 97774->97848 97776 ed966 97849 f27ec 26 API calls _abort 97776->97849 97778 ed971 97778->97767 97780 f8d6f 97779->97780 97781 f8d57 97779->97781 97783 f90d9 97780->97783 97788 f8db4 97780->97788 97859 ef2c6 20 API calls _abort 97781->97859 97875 ef2c6 20 API calls _abort 97783->97875 97784 f8d5c 97860 ef2d9 20 API calls _abort 97784->97860 97787 f90de 97876 ef2d9 20 API calls _abort 97787->97876 97789 f8d64 97788->97789 97791 f8dbf 97788->97791 97796 f8def 97788->97796 97789->97767 97861 ef2c6 20 API calls _abort 97791->97861 97792 f8dcc 97877 f27ec 26 API calls _abort 97792->97877 97794 f8dc4 97862 ef2d9 20 API calls _abort 97794->97862 97798 f8e08 97796->97798 97799 f8e2e 97796->97799 97800 f8e4a 97796->97800 97798->97799 97832 f8e15 97798->97832 97863 ef2c6 20 API calls _abort 97799->97863 97866 f3820 21 API calls 2 library calls 97800->97866 97803 f8e33 97864 ef2d9 20 API calls _abort 97803->97864 97804 f8e61 97807 f29c8 _free 20 API calls 97804->97807 97812 f8e6a 97807->97812 97808 f8fb3 97810 f9029 97808->97810 97813 f8fcc GetConsoleMode 97808->97813 97809 f8e3a 97865 f27ec 26 API calls _abort 97809->97865 97815 f902d ReadFile 97810->97815 97814 f29c8 _free 20 API calls 97812->97814 97813->97810 97816 f8fdd 97813->97816 97817 f8e71 97814->97817 97818 f9047 97815->97818 97819 f90a1 GetLastError 97815->97819 97816->97815 97820 f8fe3 ReadConsoleW 97816->97820 97821 f8e7b 97817->97821 97822 f8e96 97817->97822 97818->97819 97826 f901e 97818->97826 97823 f90ae 97819->97823 97824 f9005 97819->97824 97820->97826 97828 f8fff GetLastError 97820->97828 97867 ef2d9 20 API calls _abort 97821->97867 97869 f9424 28 API calls __wsopen_s 97822->97869 97873 ef2d9 20 API calls _abort 97823->97873 97841 f8e45 __fread_nolock 97824->97841 97870 ef2a3 20 API calls __dosmaperr 97824->97870 97836 f906c 97826->97836 97837 f9083 97826->97837 97826->97841 97828->97824 97829 f29c8 _free 20 API calls 97829->97789 97831 f90b3 97874 ef2c6 20 API calls _abort 97831->97874 97850 ff89b 97832->97850 97834 f8e80 97868 ef2c6 20 API calls _abort 97834->97868 97871 f8a61 31 API calls 3 library calls 97836->97871 97840 f909a 97837->97840 97837->97841 97872 f88a1 29 API calls __wsopen_s 97840->97872 97841->97829 97843 f909f 97843->97841 97844->97760 97845->97762 97846->97767 97847->97760 97848->97776 97849->97778 97851 ff8a8 97850->97851 97852 ff8b5 97850->97852 97878 ef2d9 20 API calls _abort 97851->97878 97855 ff8c1 97852->97855 97879 ef2d9 20 API calls _abort 97852->97879 97854 ff8ad 97854->97808 97855->97808 97857 ff8e2 97880 f27ec 26 API calls _abort 97857->97880 97859->97784 97860->97789 97861->97794 97862->97792 97863->97803 97864->97809 97865->97841 97866->97804 97867->97834 97868->97841 97869->97832 97870->97841 97871->97841 97872->97843 97873->97831 97874->97841 97875->97787 97876->97792 97877->97789 97878->97854 97879->97857 97880->97854 97884 ee4e8 97881->97884 97883 13275d 97883->97642 97887 ee469 97884->97887 97886 ee505 97886->97883 97888 ee478 97887->97888 97890 ee48c 97887->97890 97895 ef2d9 20 API calls _abort 97888->97895 97894 ee488 __alldvrm 97890->97894 97897 f333f 11 API calls 2 library calls 97890->97897 97891 ee47d 97896 f27ec 26 API calls _abort 97891->97896 97894->97886 97895->97891 97896->97894 97897->97894 97903 132e7a 97898->97903 97899 132d3b 97899->97559 97899->97577 97900 c50f5 40 API calls 97900->97903 97901 1328fe 27 API calls 97901->97903 97902 c511f 64 API calls 97902->97903 97903->97899 97903->97900 97903->97901 97903->97902 97905 1322d9 97904->97905 97906 1322e7 97904->97906 97907 ee5eb 29 API calls 97905->97907 97908 13232c 97906->97908 97909 ee5eb 29 API calls 97906->97909 97926 1322f0 97906->97926 97907->97906 97933 132557 97908->97933 97911 132311 97909->97911 97911->97908 97913 13231a 97911->97913 97912 132370 97914 132395 97912->97914 97915 132374 97912->97915 97916 ee678 67 API calls 97913->97916 97913->97926 97937 132171 97914->97937 97918 132381 97915->97918 97920 ee678 67 API calls 97915->97920 97916->97926 97923 ee678 67 API calls 97918->97923 97918->97926 97919 13239d 97921 1323c3 97919->97921 97922 1323a3 97919->97922 97920->97918 97944 1323f3 97921->97944 97924 1323b0 97922->97924 97927 ee678 67 API calls 97922->97927 97923->97926 97924->97926 97928 ee678 67 API calls 97924->97928 97926->97577 97927->97924 97928->97926 97929 1323ca 97931 1323de 97929->97931 97952 ee678 97929->97952 97931->97926 97932 ee678 67 API calls 97931->97932 97932->97926 97934 13257c 97933->97934 97936 132565 __fread_nolock 97933->97936 97935 ee8c4 __fread_nolock 40 API calls 97934->97935 97935->97936 97936->97912 97938 eea0c ___std_exception_copy 21 API calls 97937->97938 97939 13217f 97938->97939 97940 eea0c ___std_exception_copy 21 API calls 97939->97940 97941 132190 97940->97941 97942 eea0c ___std_exception_copy 21 API calls 97941->97942 97943 13219c 97942->97943 97943->97919 97951 132408 97944->97951 97945 1324c0 97969 132724 97945->97969 97946 1321cc 40 API calls 97946->97951 97948 1324c7 97948->97929 97951->97945 97951->97946 97951->97948 97965 132606 97951->97965 97973 132269 40 API calls 97951->97973 97953 ee684 ___BuildCatchObject 97952->97953 97954 ee6aa 97953->97954 97955 ee695 97953->97955 97964 ee6a5 __fread_nolock 97954->97964 98009 e918d RtlEnterCriticalSection 97954->98009 98026 ef2d9 20 API calls _abort 97955->98026 97957 ee69a 98027 f27ec 26 API calls _abort 97957->98027 97960 ee6c6 98010 ee602 97960->98010 97962 ee6d1 98028 ee6ee RtlLeaveCriticalSection __fread_nolock 97962->98028 97964->97931 97966 132617 97965->97966 97967 13261d 97965->97967 97966->97967 97974 1326d7 97966->97974 97967->97951 97970 132731 97969->97970 97971 132742 97969->97971 97972 edbb3 65 API calls 97970->97972 97971->97948 97972->97971 97973->97951 97975 132703 97974->97975 97976 132714 97974->97976 97978 edbb3 97975->97978 97976->97966 97979 edbdd 97978->97979 97980 edbc1 97978->97980 97979->97976 97980->97979 97981 edbcd 97980->97981 97982 edbe3 97980->97982 97990 ef2d9 20 API calls _abort 97981->97990 97987 ed9cc 97982->97987 97985 edbd2 97991 f27ec 26 API calls _abort 97985->97991 97992 ed97b 97987->97992 97989 ed9f0 97989->97979 97990->97985 97991->97979 97993 ed987 ___BuildCatchObject 97992->97993 98000 e918d RtlEnterCriticalSection 97993->98000 97995 ed995 98001 ed9f4 97995->98001 97999 ed9b3 __fread_nolock 97999->97989 98000->97995 98002 f49a1 27 API calls 98001->98002 98003 eda09 98002->98003 98004 eda3a 62 API calls 98003->98004 98005 eda24 98004->98005 98006 f4a56 62 API calls 98005->98006 98007 ed9a2 98006->98007 98008 ed9c0 RtlLeaveCriticalSection __fread_nolock 98007->98008 98008->97999 98009->97960 98011 ee60f 98010->98011 98012 ee624 98010->98012 98054 ef2d9 20 API calls _abort 98011->98054 98017 ee61f 98012->98017 98029 edc0b 98012->98029 98014 ee614 98055 f27ec 26 API calls _abort 98014->98055 98017->97962 98021 ed955 __fread_nolock 26 API calls 98022 ee646 98021->98022 98039 f862f 98022->98039 98025 f29c8 _free 20 API calls 98025->98017 98026->97957 98027->97964 98028->97964 98030 edc23 98029->98030 98031 edc1f 98029->98031 98030->98031 98032 ed955 __fread_nolock 26 API calls 98030->98032 98035 f4d7a 98031->98035 98033 edc43 98032->98033 98056 f59be 98033->98056 98036 ee640 98035->98036 98037 f4d90 98035->98037 98036->98021 98037->98036 98038 f29c8 _free 20 API calls 98037->98038 98038->98036 98040 f863e 98039->98040 98041 f8653 98039->98041 98179 ef2c6 20 API calls _abort 98040->98179 98042 f868e 98041->98042 98046 f867a 98041->98046 98181 ef2c6 20 API calls _abort 98042->98181 98045 f8643 98180 ef2d9 20 API calls _abort 98045->98180 98176 f8607 98046->98176 98047 f8693 98182 ef2d9 20 API calls _abort 98047->98182 98051 f869b 98183 f27ec 26 API calls _abort 98051->98183 98052 ee64c 98052->98017 98052->98025 98054->98014 98055->98017 98057 f59ca ___BuildCatchObject 98056->98057 98058 f59ea 98057->98058 98059 f59d2 98057->98059 98060 f5a88 98058->98060 98065 f5a1f 98058->98065 98135 ef2c6 20 API calls _abort 98059->98135 98140 ef2c6 20 API calls _abort 98060->98140 98063 f59d7 98136 ef2d9 20 API calls _abort 98063->98136 98064 f5a8d 98141 ef2d9 20 API calls _abort 98064->98141 98081 f5147 RtlEnterCriticalSection 98065->98081 98069 f59df __fread_nolock 98069->98031 98070 f5a95 98142 f27ec 26 API calls _abort 98070->98142 98071 f5a25 98073 f5a56 98071->98073 98074 f5a41 98071->98074 98082 f5aa9 98073->98082 98137 ef2d9 20 API calls _abort 98074->98137 98077 f5a46 98138 ef2c6 20 API calls _abort 98077->98138 98078 f5a51 98139 f5a80 RtlLeaveCriticalSection __wsopen_s 98078->98139 98081->98071 98083 f5ad7 98082->98083 98122 f5ad0 98082->98122 98084 f5adb 98083->98084 98085 f5afa 98083->98085 98150 ef2c6 20 API calls _abort 98084->98150 98088 f5b4b 98085->98088 98089 f5b2e 98085->98089 98093 f5b61 98088->98093 98156 f9424 28 API calls __wsopen_s 98088->98156 98153 ef2c6 20 API calls _abort 98089->98153 98090 f5cb1 98090->98078 98091 f5ae0 98151 ef2d9 20 API calls _abort 98091->98151 98143 f564e 98093->98143 98095 f5b33 98154 ef2d9 20 API calls _abort 98095->98154 98097 f5ae7 98152 f27ec 26 API calls _abort 98097->98152 98102 f5b6f 98105 f5b95 98102->98105 98106 f5b73 98102->98106 98103 f5ba8 98108 f5bbc 98103->98108 98109 f5c02 WriteFile 98103->98109 98104 f5b3b 98155 f27ec 26 API calls _abort 98104->98155 98158 f542e 45 API calls 3 library calls 98105->98158 98110 f5c69 98106->98110 98157 f55e1 GetLastError WriteConsoleW CreateFileW __wsopen_s 98106->98157 98113 f5bc4 98108->98113 98114 f5bf2 98108->98114 98112 f5c25 GetLastError 98109->98112 98117 f5b8b 98109->98117 98110->98122 98165 ef2d9 20 API calls _abort 98110->98165 98112->98117 98118 f5bc9 98113->98118 98119 f5be2 98113->98119 98161 f56c4 7 API calls 2 library calls 98114->98161 98117->98110 98117->98122 98126 f5c45 98117->98126 98118->98110 98124 f5bd2 98118->98124 98160 f5891 8 API calls 2 library calls 98119->98160 98121 f5be0 98121->98117 98167 e0a8c 98122->98167 98159 f57a3 7 API calls 2 library calls 98124->98159 98125 f5c8e 98166 ef2c6 20 API calls _abort 98125->98166 98129 f5c4c 98126->98129 98130 f5c60 98126->98130 98162 ef2d9 20 API calls _abort 98129->98162 98164 ef2a3 20 API calls __dosmaperr 98130->98164 98133 f5c51 98163 ef2c6 20 API calls _abort 98133->98163 98135->98063 98136->98069 98137->98077 98138->98078 98139->98069 98140->98064 98141->98070 98142->98069 98144 ff89b __fread_nolock 26 API calls 98143->98144 98145 f565e 98144->98145 98146 f5663 98145->98146 98174 f2d74 38 API calls 2 library calls 98145->98174 98146->98102 98146->98103 98148 f56a4 GetConsoleMode 98148->98146 98149 f5686 98149->98146 98149->98148 98150->98091 98151->98097 98152->98122 98153->98095 98154->98104 98155->98122 98156->98093 98157->98117 98158->98117 98159->98121 98160->98121 98161->98121 98162->98133 98163->98122 98164->98122 98165->98125 98166->98122 98168 e0a97 IsProcessorFeaturePresent 98167->98168 98169 e0a95 98167->98169 98171 e0c5d 98168->98171 98169->98090 98175 e0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 98171->98175 98173 e0d40 98173->98090 98174->98149 98175->98173 98184 f8585 98176->98184 98178 f862b 98178->98052 98179->98045 98180->98052 98181->98047 98182->98051 98183->98052 98185 f8591 ___BuildCatchObject 98184->98185 98195 f5147 RtlEnterCriticalSection 98185->98195 98187 f859f 98188 f85c6 98187->98188 98189 f85d1 98187->98189 98190 f86ae __wsopen_s 29 API calls 98188->98190 98196 ef2d9 20 API calls _abort 98189->98196 98192 f85cc 98190->98192 98197 f85fb RtlLeaveCriticalSection __wsopen_s 98192->98197 98194 f85ee __fread_nolock 98194->98178 98195->98187 98196->98192 98197->98194 98198 113a41 98202 1310c0 98198->98202 98200 113a4c 98201 1310c0 53 API calls 98200->98201 98201->98200 98203 1310fa 98202->98203 98208 1310cd 98202->98208 98203->98200 98204 1310fc 98246 dfa11 53 API calls 98204->98246 98206 131101 98213 c7510 98206->98213 98208->98203 98208->98204 98208->98206 98211 1310f4 98208->98211 98245 cb270 39 API calls 98211->98245 98214 c7525 98213->98214 98230 c7522 98213->98230 98215 c752d 98214->98215 98216 c755b 98214->98216 98247 e51c6 26 API calls 98215->98247 98218 1050f6 98216->98218 98221 c756d 98216->98221 98226 10500f 98216->98226 98256 e5183 26 API calls 98218->98256 98219 c753d 98225 dfddb 22 API calls 98219->98225 98254 dfb21 51 API calls 98221->98254 98222 10510e 98222->98222 98227 c7547 98225->98227 98229 dfe0b 22 API calls 98226->98229 98235 105088 98226->98235 98248 c9cb3 98227->98248 98231 105058 98229->98231 98236 c6350 98230->98236 98232 dfddb 22 API calls 98231->98232 98233 10507f 98232->98233 98234 c9cb3 22 API calls 98233->98234 98234->98235 98255 dfb21 51 API calls 98235->98255 98237 104a51 98236->98237 98238 c6362 98236->98238 98267 c4a88 22 API calls __fread_nolock 98237->98267 98257 c6373 98238->98257 98241 c636e 98241->98203 98242 104a5b 98243 104a67 98242->98243 98244 ca8c7 22 API calls 98242->98244 98244->98243 98245->98203 98246->98206 98247->98219 98249 c9cc2 _wcslen 98248->98249 98250 dfe0b 22 API calls 98249->98250 98251 c9cea __fread_nolock 98250->98251 98252 dfddb 22 API calls 98251->98252 98253 c9d00 98252->98253 98253->98230 98254->98219 98255->98218 98256->98222 98258 c63b6 __fread_nolock 98257->98258 98259 c6382 98257->98259 98258->98241 98259->98258 98260 104a82 98259->98260 98261 c63a9 98259->98261 98262 dfddb 22 API calls 98260->98262 98268 ca587 98261->98268 98264 104a91 98262->98264 98265 dfe0b 22 API calls 98264->98265 98266 104ac5 __fread_nolock 98265->98266 98267->98242 98269 ca59d 98268->98269 98272 ca598 __fread_nolock 98268->98272 98270 10f80f 98269->98270 98271 dfe0b 22 API calls 98269->98271 98271->98272 98272->98258 98273 112a00 98287 cd7b0 ISource 98273->98287 98274 cdb11 PeekMessageW 98274->98287 98275 cd807 GetInputState 98275->98274 98275->98287 98277 111cbe TranslateAcceleratorW 98277->98287 98278 cda04 timeGetTime 98278->98287 98279 cdb8f PeekMessageW 98279->98287 98280 cdb73 TranslateMessage DispatchMessageW 98280->98279 98281 cdbaf Sleep 98295 cdbc0 98281->98295 98282 112b74 Sleep 98282->98295 98283 de551 timeGetTime 98283->98295 98284 111dda timeGetTime 98389 de300 23 API calls 98284->98389 98287->98274 98287->98275 98287->98277 98287->98278 98287->98279 98287->98280 98287->98281 98287->98282 98287->98284 98290 cd9d5 98287->98290 98301 cec40 235 API calls 98287->98301 98303 cbf40 235 API calls 98287->98303 98305 cdfd0 98287->98305 98328 d1310 98287->98328 98383 dedf6 98287->98383 98388 cdd50 235 API calls 98287->98388 98390 133a2a 23 API calls 98287->98390 98391 13359c 82 API calls __wsopen_s 98287->98391 98288 112c0b GetExitCodeProcess 98291 112c21 WaitForSingleObject 98288->98291 98292 112c37 CloseHandle 98288->98292 98291->98287 98291->98292 98292->98295 98293 112a31 98293->98290 98294 1529bf GetForegroundWindow 98294->98295 98295->98283 98295->98287 98295->98288 98295->98290 98295->98293 98295->98294 98296 112ca9 Sleep 98295->98296 98392 145658 23 API calls 98295->98392 98393 12e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98295->98393 98394 12d4dc 47 API calls 98295->98394 98296->98287 98301->98287 98303->98287 98307 ce010 98305->98307 98306 cec40 235 API calls 98313 ce0dc ISource 98306->98313 98307->98313 98397 e0242 5 API calls __Init_thread_wait 98307->98397 98310 112fca 98312 ca961 22 API calls 98310->98312 98310->98313 98311 ca961 22 API calls 98311->98313 98314 112fe4 98312->98314 98313->98306 98313->98311 98322 ca8c7 22 API calls 98313->98322 98323 d04f0 22 API calls 98313->98323 98324 ce3e1 98313->98324 98325 13359c 82 API calls 98313->98325 98395 ca81b 41 API calls 98313->98395 98396 da308 235 API calls 98313->98396 98400 e0242 5 API calls __Init_thread_wait 98313->98400 98401 e00a3 29 API calls __onexit 98313->98401 98402 e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent 98313->98402 98403 1447d4 235 API calls 98313->98403 98404 1468c1 235 API calls 98313->98404 98398 e00a3 29 API calls __onexit 98314->98398 98318 112fee 98399 e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent 98318->98399 98322->98313 98323->98313 98324->98287 98325->98313 98329 d17b0 98328->98329 98332 d1376 98328->98332 98517 e0242 5 API calls __Init_thread_wait 98329->98517 98331 116331 98522 14709c 235 API calls 98331->98522 98332->98331 98335 d1940 9 API calls 98332->98335 98334 d17ba 98337 d17fb 98334->98337 98340 c9cb3 22 API calls 98334->98340 98338 d13a0 98335->98338 98336 11633d 98336->98287 98342 116346 98337->98342 98344 d182c 98337->98344 98339 d1940 9 API calls 98338->98339 98341 d13b6 98339->98341 98348 d17d4 98340->98348 98341->98337 98343 d13ec 98341->98343 98523 13359c 82 API calls __wsopen_s 98342->98523 98343->98342 98368 d1408 __fread_nolock 98343->98368 98519 caceb 23 API calls ISource 98344->98519 98347 d1839 98520 dd217 235 API calls 98347->98520 98518 e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent 98348->98518 98351 11636e 98524 13359c 82 API calls __wsopen_s 98351->98524 98352 d152f 98354 1163d1 98352->98354 98355 d153c 98352->98355 98526 145745 54 API calls _wcslen 98354->98526 98357 d1940 9 API calls 98355->98357 98358 d1549 98357->98358 98362 d1940 9 API calls 98358->98362 98374 d15c7 ISource 98358->98374 98359 dfddb 22 API calls 98359->98368 98360 dfe0b 22 API calls 98360->98368 98361 d1872 98361->98331 98521 dfaeb 23 API calls 98361->98521 98372 d1563 98362->98372 98363 d171d 98363->98287 98366 cec40 235 API calls 98366->98368 98367 d167b ISource 98367->98363 98516 dce17 22 API calls ISource 98367->98516 98368->98347 98368->98351 98368->98352 98368->98359 98368->98360 98368->98366 98369 1163b2 98368->98369 98368->98374 98525 13359c 82 API calls __wsopen_s 98369->98525 98371 d1940 9 API calls 98371->98374 98372->98374 98375 ca8c7 22 API calls 98372->98375 98374->98361 98374->98367 98374->98371 98378 c4f39 68 API calls 98374->98378 98405 136ef1 98374->98405 98485 13f0ec 98374->98485 98494 12d4ce 98374->98494 98497 14958b 98374->98497 98500 14959f 98374->98500 98503 14e505 98374->98503 98527 13359c 82 API calls __wsopen_s 98374->98527 98375->98374 98378->98374 98384 dee09 98383->98384 98385 dee12 98383->98385 98384->98287 98385->98384 98386 dee36 IsDialogMessageW 98385->98386 98387 11efaf GetClassLongW 98385->98387 98386->98384 98386->98385 98387->98385 98387->98386 98388->98287 98389->98287 98390->98287 98391->98287 98392->98295 98393->98295 98394->98295 98395->98313 98396->98313 98397->98310 98398->98318 98399->98313 98400->98313 98401->98313 98402->98313 98403->98313 98404->98313 98406 ca961 22 API calls 98405->98406 98407 136f1d 98406->98407 98408 ca961 22 API calls 98407->98408 98409 136f26 98408->98409 98410 136f3a 98409->98410 98682 cb567 98409->98682 98412 c7510 53 API calls 98410->98412 98419 136f57 _wcslen 98412->98419 98413 1370bf 98416 c4ecb 94 API calls 98413->98416 98414 136fbc 98415 c7510 53 API calls 98414->98415 98417 136fc8 98415->98417 98418 1370d0 98416->98418 98422 ca8c7 22 API calls 98417->98422 98428 136fdb 98417->98428 98420 1370e5 98418->98420 98423 c4ecb 94 API calls 98418->98423 98419->98413 98419->98414 98425 1370e9 98419->98425 98421 ca961 22 API calls 98420->98421 98420->98425 98424 13711a 98421->98424 98422->98428 98423->98420 98426 ca961 22 API calls 98424->98426 98425->98374 98430 137126 98426->98430 98427 137027 98429 c7510 53 API calls 98427->98429 98428->98427 98431 137005 98428->98431 98434 ca8c7 22 API calls 98428->98434 98432 137034 98429->98432 98433 ca961 22 API calls 98430->98433 98687 c33c6 98431->98687 98436 137047 98432->98436 98437 13703d 98432->98437 98438 13712f 98433->98438 98434->98431 98696 12e199 GetFileAttributesW 98436->98696 98440 ca8c7 22 API calls 98437->98440 98442 ca961 22 API calls 98438->98442 98439 13700f 98443 c7510 53 API calls 98439->98443 98440->98436 98446 137138 98442->98446 98444 13701b 98443->98444 98447 c6350 22 API calls 98444->98447 98445 137050 98448 137063 98445->98448 98451 c4c6d 22 API calls 98445->98451 98449 c7510 53 API calls 98446->98449 98447->98427 98450 c7510 53 API calls 98448->98450 98457 137069 98448->98457 98452 137145 98449->98452 98453 1370a0 98450->98453 98451->98448 98528 c525f 98452->98528 98697 12d076 57 API calls 98453->98697 98456 137166 98570 c4c6d 98456->98570 98457->98425 98460 1371a9 98462 ca8c7 22 API calls 98460->98462 98461 c4c6d 22 API calls 98463 137186 98461->98463 98464 1371ba 98462->98464 98463->98460 98466 c6b57 22 API calls 98463->98466 98465 c6350 22 API calls 98464->98465 98467 1371c8 98465->98467 98468 13719b 98466->98468 98469 c6350 22 API calls 98467->98469 98470 c6b57 22 API calls 98468->98470 98471 1371d6 98469->98471 98470->98460 98472 c6350 22 API calls 98471->98472 98473 1371e4 98472->98473 98474 c7510 53 API calls 98473->98474 98475 1371f0 98474->98475 98573 12d7bc 98475->98573 98477 137201 98478 12d4ce 4 API calls 98477->98478 98479 13720b 98478->98479 98480 c7510 53 API calls 98479->98480 98484 137239 98479->98484 98481 137229 98480->98481 98627 132947 98481->98627 98483 c4f39 68 API calls 98483->98425 98484->98483 98486 c7510 53 API calls 98485->98486 98487 13f126 98486->98487 98731 c9e90 98487->98731 98489 13f136 98490 13f15b 98489->98490 98491 cec40 235 API calls 98489->98491 98493 13f15f 98490->98493 98759 c9c6e 22 API calls 98490->98759 98491->98490 98493->98374 98772 12dbbe lstrlenW 98494->98772 98777 147f59 98497->98777 98499 14959b 98499->98374 98501 147f59 120 API calls 98500->98501 98502 1495af 98501->98502 98502->98374 98504 c7510 53 API calls 98503->98504 98505 14e51d 98504->98505 98506 ca961 22 API calls 98505->98506 98507 14e52b 98506->98507 98508 cb567 39 API calls 98507->98508 98510 14e536 98508->98510 98509 14e560 98869 c62b5 22 API calls 98509->98869 98510->98509 98512 c7510 53 API calls 98510->98512 98514 14e551 98512->98514 98513 14e56c 98513->98374 98515 c6d25 22 API calls 98514->98515 98515->98509 98516->98367 98517->98334 98518->98337 98519->98347 98520->98361 98521->98361 98522->98336 98523->98374 98524->98374 98525->98374 98526->98372 98527->98374 98529 ca961 22 API calls 98528->98529 98530 c5275 98529->98530 98531 ca961 22 API calls 98530->98531 98532 c527d 98531->98532 98533 ca961 22 API calls 98532->98533 98534 c5285 98533->98534 98535 ca961 22 API calls 98534->98535 98536 c528d 98535->98536 98537 103df5 98536->98537 98538 c52c1 98536->98538 98539 ca8c7 22 API calls 98537->98539 98540 c6d25 22 API calls 98538->98540 98541 103dfe 98539->98541 98542 c52cf 98540->98542 98543 ca6c3 22 API calls 98541->98543 98544 c93b2 22 API calls 98542->98544 98547 c5304 98543->98547 98545 c52d9 98544->98545 98546 c6d25 22 API calls 98545->98546 98545->98547 98550 c52fa 98546->98550 98548 c5325 98547->98548 98562 c5349 98547->98562 98565 103e20 98547->98565 98553 c4c6d 22 API calls 98548->98553 98548->98562 98552 c93b2 22 API calls 98550->98552 98551 c535a 98554 c5370 98551->98554 98558 ca8c7 22 API calls 98551->98558 98552->98547 98556 c5332 98553->98556 98555 c5384 98554->98555 98560 ca8c7 22 API calls 98554->98560 98559 c538f 98555->98559 98563 ca8c7 22 API calls 98555->98563 98561 c6d25 22 API calls 98556->98561 98556->98562 98557 c6b57 22 API calls 98567 103ee0 98557->98567 98558->98554 98564 ca8c7 22 API calls 98559->98564 98568 c539a 98559->98568 98560->98555 98561->98562 98698 c6d25 98562->98698 98563->98559 98564->98568 98565->98557 98566 c4c6d 22 API calls 98566->98567 98567->98562 98567->98566 98711 c49bd 22 API calls __fread_nolock 98567->98711 98568->98456 98571 caec9 22 API calls 98570->98571 98572 c4c78 98571->98572 98572->98460 98572->98461 98574 12d7d8 98573->98574 98575 12d7f3 98574->98575 98576 12d7dd 98574->98576 98577 ca961 22 API calls 98575->98577 98578 ca8c7 22 API calls 98576->98578 98626 12d7ee 98576->98626 98579 12d7fb 98577->98579 98578->98626 98580 ca961 22 API calls 98579->98580 98581 12d803 98580->98581 98582 ca961 22 API calls 98581->98582 98583 12d80e 98582->98583 98584 ca961 22 API calls 98583->98584 98585 12d816 98584->98585 98586 ca961 22 API calls 98585->98586 98587 12d81e 98586->98587 98588 ca961 22 API calls 98587->98588 98589 12d826 98588->98589 98590 ca961 22 API calls 98589->98590 98591 12d82e 98590->98591 98592 ca961 22 API calls 98591->98592 98593 12d836 98592->98593 98594 c525f 22 API calls 98593->98594 98595 12d84d 98594->98595 98596 c525f 22 API calls 98595->98596 98597 12d866 98596->98597 98598 c4c6d 22 API calls 98597->98598 98599 12d872 98598->98599 98600 12d885 98599->98600 98601 c93b2 22 API calls 98599->98601 98602 c4c6d 22 API calls 98600->98602 98601->98600 98603 12d88e 98602->98603 98604 12d89e 98603->98604 98605 c93b2 22 API calls 98603->98605 98606 12d8b0 98604->98606 98607 ca8c7 22 API calls 98604->98607 98605->98604 98608 c6350 22 API calls 98606->98608 98607->98606 98609 12d8bb 98608->98609 98712 12d978 22 API calls 98609->98712 98611 12d8ca 98713 12d978 22 API calls 98611->98713 98613 12d8dd 98614 c4c6d 22 API calls 98613->98614 98615 12d8e7 98614->98615 98616 12d8fe 98615->98616 98617 12d8ec 98615->98617 98619 c4c6d 22 API calls 98616->98619 98618 c33c6 22 API calls 98617->98618 98620 12d8f9 98618->98620 98621 12d907 98619->98621 98624 c6350 22 API calls 98620->98624 98622 12d925 98621->98622 98623 c33c6 22 API calls 98621->98623 98625 c6350 22 API calls 98622->98625 98623->98620 98624->98622 98625->98626 98626->98477 98628 132954 __wsopen_s 98627->98628 98629 dfe0b 22 API calls 98628->98629 98630 132971 98629->98630 98631 c5722 22 API calls 98630->98631 98632 13297b 98631->98632 98633 13274e 27 API calls 98632->98633 98634 132986 98633->98634 98635 c511f 64 API calls 98634->98635 98636 13299b 98635->98636 98637 1329bf 98636->98637 98638 132a6c 98636->98638 98639 132e66 75 API calls 98637->98639 98640 132e66 75 API calls 98638->98640 98641 1329c4 98639->98641 98655 132a38 98640->98655 98645 132a75 ISource 98641->98645 98718 ed583 26 API calls 98641->98718 98643 c50f5 40 API calls 98644 132a91 98643->98644 98646 c50f5 40 API calls 98644->98646 98645->98484 98648 132aa1 98646->98648 98647 1329ed 98719 ed583 26 API calls 98647->98719 98649 c50f5 40 API calls 98648->98649 98651 132abc 98649->98651 98652 c50f5 40 API calls 98651->98652 98653 132acc 98652->98653 98654 c50f5 40 API calls 98653->98654 98656 132ae7 98654->98656 98655->98643 98655->98645 98657 c50f5 40 API calls 98656->98657 98658 132af7 98657->98658 98659 c50f5 40 API calls 98658->98659 98660 132b07 98659->98660 98661 c50f5 40 API calls 98660->98661 98662 132b17 98661->98662 98714 133017 GetTempPathW GetTempFileNameW 98662->98714 98664 132b22 98665 ee5eb 29 API calls 98664->98665 98675 132b33 98665->98675 98666 132bed 98667 ee678 67 API calls 98666->98667 98668 132bf8 98667->98668 98670 132c12 98668->98670 98671 132bfe DeleteFileW 98668->98671 98669 c50f5 40 API calls 98669->98675 98672 132c91 CopyFileW 98670->98672 98678 132c18 98670->98678 98671->98645 98673 132ca7 DeleteFileW 98672->98673 98674 132cb9 DeleteFileW 98672->98674 98673->98645 98715 132fd8 CreateFileW 98674->98715 98675->98645 98675->98666 98675->98669 98677 edbb3 65 API calls 98675->98677 98677->98675 98679 1322ce 79 API calls 98678->98679 98680 132c7c 98679->98680 98680->98674 98681 132c80 DeleteFileW 98680->98681 98681->98645 98683 cb578 98682->98683 98684 cb57f 98682->98684 98683->98684 98720 e62d1 39 API calls 98683->98720 98684->98410 98686 cb5c2 98686->98410 98688 c33dd 98687->98688 98689 1030bb 98687->98689 98721 c33ee 98688->98721 98691 dfddb 22 API calls 98689->98691 98693 1030c5 _wcslen 98691->98693 98692 c33e8 98692->98439 98694 dfe0b 22 API calls 98693->98694 98695 1030fe __fread_nolock 98694->98695 98696->98445 98697->98457 98699 c6d34 98698->98699 98700 c6d91 98698->98700 98699->98700 98702 c6d3f 98699->98702 98701 c93b2 22 API calls 98700->98701 98703 c6d62 __fread_nolock 98701->98703 98704 c6d5a 98702->98704 98705 104c9d 98702->98705 98703->98551 98707 c6f34 22 API calls 98704->98707 98706 dfddb 22 API calls 98705->98706 98708 104ca7 98706->98708 98707->98703 98709 dfe0b 22 API calls 98708->98709 98710 104cda 98709->98710 98711->98567 98712->98611 98713->98613 98714->98664 98716 133013 98715->98716 98717 132fff SetFileTime CloseHandle 98715->98717 98716->98645 98717->98716 98718->98647 98719->98655 98720->98686 98722 c33fe _wcslen 98721->98722 98723 10311d 98722->98723 98724 c3411 98722->98724 98725 dfddb 22 API calls 98723->98725 98726 ca587 22 API calls 98724->98726 98727 103127 98725->98727 98728 c341e __fread_nolock 98726->98728 98729 dfe0b 22 API calls 98727->98729 98728->98692 98730 103157 __fread_nolock 98729->98730 98760 c6270 98731->98760 98733 c9fd2 98734 ca4a1 22 API calls 98733->98734 98735 c9fec 98734->98735 98735->98489 98738 ca6c3 22 API calls 98758 c9eb5 98738->98758 98739 10f7c4 98770 1296e2 84 API calls __wsopen_s 98739->98770 98740 10f699 98746 dfddb 22 API calls 98740->98746 98742 ca405 98742->98735 98771 1296e2 84 API calls __wsopen_s 98742->98771 98745 10f7d2 98747 ca4a1 22 API calls 98745->98747 98748 10f754 98746->98748 98749 10f7e8 98747->98749 98750 dfe0b 22 API calls 98748->98750 98749->98735 98752 ca12c __fread_nolock 98750->98752 98752->98739 98752->98742 98753 ca587 22 API calls 98753->98758 98754 ca4a1 22 API calls 98754->98758 98755 caec9 22 API calls 98756 ca0db CharUpperBuffW 98755->98756 98766 ca673 22 API calls 98756->98766 98758->98733 98758->98738 98758->98739 98758->98740 98758->98742 98758->98752 98758->98753 98758->98754 98758->98755 98765 c4573 41 API calls _wcslen 98758->98765 98767 c48c8 23 API calls 98758->98767 98768 c49bd 22 API calls __fread_nolock 98758->98768 98769 ca673 22 API calls 98758->98769 98759->98493 98761 dfe0b 22 API calls 98760->98761 98762 c6295 98761->98762 98763 dfddb 22 API calls 98762->98763 98764 c62a3 98763->98764 98764->98758 98765->98758 98766->98758 98767->98758 98768->98758 98769->98758 98770->98745 98771->98735 98773 12d4d5 98772->98773 98774 12dbdc GetFileAttributesW 98772->98774 98773->98374 98774->98773 98775 12dbe8 FindFirstFileW 98774->98775 98775->98773 98776 12dbf9 FindClose 98775->98776 98776->98773 98778 c7510 53 API calls 98777->98778 98779 147f90 98778->98779 98801 147fd5 ISource 98779->98801 98815 148cd3 98779->98815 98781 148281 98782 14844f 98781->98782 98786 14828f 98781->98786 98856 148ee4 60 API calls 98782->98856 98785 14845e 98785->98786 98787 14846a 98785->98787 98828 147e86 98786->98828 98787->98801 98788 c7510 53 API calls 98805 148049 98788->98805 98793 1482c8 98843 dfc70 98793->98843 98796 148302 98850 c63eb 22 API calls 98796->98850 98797 1482e8 98849 13359c 82 API calls __wsopen_s 98797->98849 98800 148311 98851 c6a50 22 API calls 98800->98851 98801->98499 98802 1482f3 GetCurrentProcess TerminateProcess 98802->98796 98804 14832a 98813 148352 98804->98813 98852 d04f0 22 API calls 98804->98852 98805->98781 98805->98788 98805->98801 98847 12417d 22 API calls __fread_nolock 98805->98847 98848 14851d 42 API calls _strftime 98805->98848 98807 1484c5 98807->98801 98809 1484d9 FreeLibrary 98807->98809 98808 148341 98853 148b7b 75 API calls 98808->98853 98809->98801 98813->98807 98854 d04f0 22 API calls 98813->98854 98855 caceb 23 API calls ISource 98813->98855 98857 148b7b 75 API calls 98813->98857 98816 caec9 22 API calls 98815->98816 98817 148cee CharLowerBuffW 98816->98817 98858 128e54 98817->98858 98821 ca961 22 API calls 98822 148d2a 98821->98822 98823 c6d25 22 API calls 98822->98823 98824 148d3e 98823->98824 98825 c93b2 22 API calls 98824->98825 98827 148d48 _wcslen 98825->98827 98826 148e5e _wcslen 98826->98805 98827->98826 98865 14851d 42 API calls _strftime 98827->98865 98829 147ea1 98828->98829 98833 147eec 98828->98833 98830 dfe0b 22 API calls 98829->98830 98831 147ec3 98830->98831 98832 dfddb 22 API calls 98831->98832 98831->98833 98832->98831 98834 149096 98833->98834 98835 1492ab ISource 98834->98835 98842 1490ba _strcat _wcslen 98834->98842 98835->98793 98836 cb38f 39 API calls 98836->98842 98837 cb567 39 API calls 98837->98842 98838 cb6b5 39 API calls 98838->98842 98839 eea0c 21 API calls ___std_exception_copy 98839->98842 98840 c7510 53 API calls 98840->98842 98842->98835 98842->98836 98842->98837 98842->98838 98842->98839 98842->98840 98868 12efae 24 API calls _wcslen 98842->98868 98844 dfc85 98843->98844 98845 dfd1d VirtualProtect 98844->98845 98846 dfceb 98844->98846 98845->98846 98846->98796 98846->98797 98847->98805 98848->98805 98849->98802 98850->98800 98851->98804 98852->98808 98853->98813 98854->98813 98855->98813 98856->98785 98857->98813 98860 128e74 _wcslen 98858->98860 98859 128f63 98859->98821 98859->98827 98860->98859 98861 128f68 98860->98861 98863 128ea9 98860->98863 98861->98859 98867 dce60 41 API calls 98861->98867 98863->98859 98866 dce60 41 API calls 98863->98866 98865->98826 98866->98863 98867->98861 98868->98842 98869->98513 98870 cf7bf 98871 cfcb6 98870->98871 98872 cf7d3 98870->98872 98907 caceb 23 API calls ISource 98871->98907 98874 cfcc2 98872->98874 98875 dfddb 22 API calls 98872->98875 98908 caceb 23 API calls ISource 98874->98908 98877 cf7e5 98875->98877 98877->98874 98878 cf83e 98877->98878 98879 cfd3d 98877->98879 98881 d1310 235 API calls 98878->98881 98896 ced9d ISource 98878->98896 98909 131155 22 API calls 98879->98909 98902 cec76 ISource 98881->98902 98882 cfef7 98888 ca8c7 22 API calls 98882->98888 98882->98896 98885 dfddb 22 API calls 98885->98902 98886 114600 98891 ca8c7 22 API calls 98886->98891 98886->98896 98887 114b0b 98911 13359c 82 API calls __wsopen_s 98887->98911 98888->98896 98891->98896 98893 ca8c7 22 API calls 98893->98902 98894 e0242 RtlEnterCriticalSection RtlLeaveCriticalSection RtlLeaveCriticalSection WaitForSingleObjectEx RtlEnterCriticalSection 98894->98902 98895 cfbe3 98895->98896 98899 114bdc 98895->98899 98904 cf3ae ISource 98895->98904 98897 ca961 22 API calls 98897->98902 98898 e00a3 29 API calls pre_c_initialization 98898->98902 98912 13359c 82 API calls __wsopen_s 98899->98912 98901 114beb 98913 13359c 82 API calls __wsopen_s 98901->98913 98902->98882 98902->98885 98902->98886 98902->98887 98902->98893 98902->98894 98902->98895 98902->98896 98902->98897 98902->98898 98902->98901 98903 e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 98902->98903 98902->98904 98905 d01e0 235 API calls 2 library calls 98902->98905 98906 d06a0 41 API calls ISource 98902->98906 98903->98902 98904->98896 98910 13359c 82 API calls __wsopen_s 98904->98910 98905->98902 98906->98902 98907->98874 98908->98879 98909->98896 98910->98896 98911->98896 98912->98901 98913->98896 98914 c1098 98919 c42de 98914->98919 98918 c10a7 98920 ca961 22 API calls 98919->98920 98921 c42f5 GetVersionExW 98920->98921 98922 c6b57 22 API calls 98921->98922 98923 c4342 98922->98923 98924 c93b2 22 API calls 98923->98924 98926 c4378 98923->98926 98925 c436c 98924->98925 98928 c37a0 22 API calls 98925->98928 98927 c441b GetCurrentProcess IsWow64Process 98926->98927 98935 1037df 98926->98935 98929 c4437 98927->98929 98928->98926 98930 c444f LoadLibraryA 98929->98930 98931 103824 GetSystemInfo 98929->98931 98932 c449c GetSystemInfo 98930->98932 98933 c4460 GetProcAddress 98930->98933 98934 c4476 98932->98934 98933->98932 98936 c4470 GetNativeSystemInfo 98933->98936 98937 c447a FreeLibrary 98934->98937 98938 c109d 98934->98938 98936->98934 98937->98938 98939 e00a3 29 API calls __onexit 98938->98939 98939->98918 98940 f90fa 98941 f9107 98940->98941 98944 f911f 98940->98944 98990 ef2d9 20 API calls _abort 98941->98990 98943 f910c 98991 f27ec 26 API calls _abort 98943->98991 98946 f917a 98944->98946 98954 f9117 98944->98954 98992 ffdc4 21 API calls 2 library calls 98944->98992 98948 ed955 __fread_nolock 26 API calls 98946->98948 98949 f9192 98948->98949 98960 f8c32 98949->98960 98951 f9199 98952 ed955 __fread_nolock 26 API calls 98951->98952 98951->98954 98953 f91c5 98952->98953 98953->98954 98955 ed955 __fread_nolock 26 API calls 98953->98955 98956 f91d3 98955->98956 98956->98954 98957 ed955 __fread_nolock 26 API calls 98956->98957 98958 f91e3 98957->98958 98959 ed955 __fread_nolock 26 API calls 98958->98959 98959->98954 98961 f8c3e ___BuildCatchObject 98960->98961 98962 f8c5e 98961->98962 98963 f8c46 98961->98963 98964 f8d24 98962->98964 98968 f8c97 98962->98968 98994 ef2c6 20 API calls _abort 98963->98994 99001 ef2c6 20 API calls _abort 98964->99001 98967 f8c4b 98995 ef2d9 20 API calls _abort 98967->98995 98971 f8cbb 98968->98971 98972 f8ca6 98968->98972 98969 f8d29 99002 ef2d9 20 API calls _abort 98969->99002 98993 f5147 RtlEnterCriticalSection 98971->98993 98996 ef2c6 20 API calls _abort 98972->98996 98976 f8cb3 99003 f27ec 26 API calls _abort 98976->99003 98977 f8c53 __fread_nolock 98977->98951 98978 f8cab 98997 ef2d9 20 API calls _abort 98978->98997 98979 f8cc1 98981 f8cdd 98979->98981 98982 f8cf2 98979->98982 98998 ef2d9 20 API calls _abort 98981->98998 98984 f8d45 __fread_nolock 38 API calls 98982->98984 98986 f8ced 98984->98986 99000 f8d1c RtlLeaveCriticalSection __wsopen_s 98986->99000 98987 f8ce2 98999 ef2c6 20 API calls _abort 98987->98999 98990->98943 98991->98954 98992->98946 98993->98979 98994->98967 98995->98977 98996->98978 98997->98976 98998->98987 98999->98986 99000->98977 99001->98969 99002->98976 99003->98977 99004 102ba5 99005 c2b25 99004->99005 99006 102baf 99004->99006 99032 c2b83 7 API calls 99005->99032 99047 c3a5a 99006->99047 99010 102bb8 99012 c9cb3 22 API calls 99010->99012 99014 102bc6 99012->99014 99013 c2b2f 99021 c2b44 99013->99021 99036 c3837 99013->99036 99015 102bf5 99014->99015 99016 102bce 99014->99016 99017 c33c6 22 API calls 99015->99017 99019 c33c6 22 API calls 99016->99019 99020 102bf1 GetForegroundWindow ShellExecuteW 99017->99020 99022 102bd9 99019->99022 99026 102c26 99020->99026 99024 c2b5f 99021->99024 99046 c30f2 Shell_NotifyIconW ___scrt_fastfail 99021->99046 99025 c6350 22 API calls 99022->99025 99030 c2b66 SetCurrentDirectoryW 99024->99030 99028 102be7 99025->99028 99026->99024 99029 c33c6 22 API calls 99028->99029 99029->99020 99031 c2b7a 99030->99031 99054 c2cd4 GetSysColorBrush RegisterClassExW RegisterClipboardFormatW 99032->99054 99035 c2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 99035->99013 99037 c3862 ___scrt_fastfail 99036->99037 99058 c4212 99037->99058 99040 c38e8 99042 103386 Shell_NotifyIconW 99040->99042 99043 c3906 Shell_NotifyIconW 99040->99043 99062 c3923 99043->99062 99045 c391c 99045->99021 99046->99024 99048 101f50 __wsopen_s 99047->99048 99049 c3a67 GetModuleFileNameW 99048->99049 99050 c9cb3 22 API calls 99049->99050 99051 c3a8d 99050->99051 99052 c3aa2 23 API calls 99051->99052 99053 c3a97 99052->99053 99053->99010 99055 c2d65 LoadIconW 99054->99055 99057 c2b2a 99055->99057 99057->99035 99059 1035a4 99058->99059 99060 c38b7 99058->99060 99059->99060 99061 1035ad DestroyCursor 99059->99061 99060->99040 99084 12c874 42 API calls _strftime 99060->99084 99061->99060 99063 c393f 99062->99063 99064 c3a13 99062->99064 99065 c6270 22 API calls 99063->99065 99064->99045 99066 c394d 99065->99066 99067 103393 LoadStringW 99066->99067 99068 c395a 99066->99068 99070 1033ad 99067->99070 99069 c6b57 22 API calls 99068->99069 99071 c396f 99069->99071 99074 ca8c7 22 API calls 99070->99074 99078 c3994 ___scrt_fastfail 99070->99078 99072 c397c 99071->99072 99073 1033c9 99071->99073 99072->99070 99075 c3986 99072->99075 99076 c6350 22 API calls 99073->99076 99074->99078 99077 c6350 22 API calls 99075->99077 99079 1033d7 99076->99079 99077->99078 99081 c39f9 Shell_NotifyIconW 99078->99081 99079->99078 99080 c33c6 22 API calls 99079->99080 99082 1033f9 99080->99082 99081->99064 99083 c33c6 22 API calls 99082->99083 99083->99078 99084->99040 99085 e03fb 99086 e0407 ___BuildCatchObject 99085->99086 99116 dfeb1 99086->99116 99088 e040e 99089 e0561 99088->99089 99092 e0438 99088->99092 99143 e083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 99089->99143 99091 e0568 99144 e4e52 28 API calls _abort 99091->99144 99105 e0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 99092->99105 99127 f247d 99092->99127 99094 e056e 99145 e4e04 28 API calls _abort 99094->99145 99098 e0576 99146 e0aea GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 99098->99146 99099 e0457 99102 e057c __scrt_common_main_seh 99103 e04d8 99135 e0959 99103->99135 99105->99103 99139 e4e1a 38 API calls 2 library calls 99105->99139 99107 e04de 99108 e04f3 99107->99108 99140 e0992 GetModuleHandleW 99108->99140 99110 e04fa 99110->99091 99111 e04fe 99110->99111 99112 e0507 99111->99112 99141 e4df5 28 API calls _abort 99111->99141 99142 e0040 13 API calls 2 library calls 99112->99142 99115 e050f 99115->99099 99117 dfeba 99116->99117 99147 e0698 IsProcessorFeaturePresent 99117->99147 99119 dfec6 99148 e2c94 10 API calls 3 library calls 99119->99148 99121 dfecb 99122 dfecf 99121->99122 99149 f2317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 99121->99149 99122->99088 99124 dfed8 99125 dfee6 99124->99125 99150 e2cbd 8 API calls 3 library calls 99124->99150 99125->99088 99130 f2494 99127->99130 99128 e0a8c _ValidateLocalCookies 5 API calls 99129 e0451 99128->99129 99129->99099 99131 f2421 99129->99131 99130->99128 99134 f2450 99131->99134 99132 e0a8c _ValidateLocalCookies 5 API calls 99133 f2479 99132->99133 99133->99105 99134->99132 99151 e2340 99135->99151 99138 e097f 99138->99107 99139->99103 99140->99110 99141->99112 99142->99115 99143->99091 99144->99094 99145->99098 99146->99102 99147->99119 99148->99121 99149->99124 99150->99122 99152 e096c GetStartupInfoW 99151->99152 99152->99138 99153 c1056 99158 c344d 99153->99158 99155 c106a 99189 e00a3 29 API calls __onexit 99155->99189 99157 c1074 99159 c345d __wsopen_s 99158->99159 99160 ca961 22 API calls 99159->99160 99161 c3513 99160->99161 99162 c3a5a 24 API calls 99161->99162 99163 c351c 99162->99163 99190 c3357 99163->99190 99166 c33c6 22 API calls 99167 c3535 99166->99167 99168 c515f 22 API calls 99167->99168 99169 c3544 99168->99169 99170 ca961 22 API calls 99169->99170 99171 c354d 99170->99171 99172 ca6c3 22 API calls 99171->99172 99173 c3556 RegOpenKeyExW 99172->99173 99174 103176 RegQueryValueExW 99173->99174 99178 c3578 99173->99178 99175 103193 99174->99175 99176 10320c RegCloseKey 99174->99176 99177 dfe0b 22 API calls 99175->99177 99176->99178 99188 10321e _wcslen 99176->99188 99179 1031ac 99177->99179 99178->99155 99180 c5722 22 API calls 99179->99180 99181 1031b7 RegQueryValueExW 99180->99181 99183 1031d4 99181->99183 99185 1031ee ISource 99181->99185 99182 c4c6d 22 API calls 99182->99188 99184 c6b57 22 API calls 99183->99184 99184->99185 99185->99176 99186 c9cb3 22 API calls 99186->99188 99187 c515f 22 API calls 99187->99188 99188->99178 99188->99182 99188->99186 99188->99187 99189->99157 99191 101f50 __wsopen_s 99190->99191 99192 c3364 GetFullPathNameW 99191->99192 99193 c3386 99192->99193 99194 c6b57 22 API calls 99193->99194 99195 c33a4 99194->99195 99195->99166 99196 c3156 99199 c3170 99196->99199 99200 c3187 99199->99200 99201 c318c 99200->99201 99202 c31eb 99200->99202 99239 c31e9 99200->99239 99206 c3199 99201->99206 99207 c3265 PostQuitMessage 99201->99207 99204 102dfb 99202->99204 99205 c31f1 99202->99205 99203 c31d0 NtdllDefWindowProc_W 99231 c316a 99203->99231 99255 c18e2 10 API calls 99204->99255 99208 c321d SetTimer RegisterClipboardFormatW 99205->99208 99209 c31f8 99205->99209 99211 c31a4 99206->99211 99212 102e7c 99206->99212 99207->99231 99216 c3246 CreatePopupMenu 99208->99216 99208->99231 99213 102d9c 99209->99213 99214 c3201 KillTimer 99209->99214 99217 c31ae 99211->99217 99218 102e68 99211->99218 99259 12bf30 34 API calls ___scrt_fastfail 99212->99259 99220 102da1 99213->99220 99221 102dd7 MoveWindow 99213->99221 99251 c30f2 Shell_NotifyIconW ___scrt_fastfail 99214->99251 99215 102e1c 99256 de499 42 API calls 99215->99256 99216->99231 99225 c31b9 99217->99225 99226 102e4d 99217->99226 99244 12c161 99218->99244 99228 102dc6 SetFocus 99220->99228 99229 102da7 99220->99229 99221->99231 99232 c31c4 99225->99232 99233 c3253 99225->99233 99226->99203 99258 120ad7 22 API calls 99226->99258 99227 102e8e 99227->99203 99227->99231 99228->99231 99229->99232 99234 102db0 99229->99234 99230 c3214 99252 c3c50 DeleteObject DestroyWindow 99230->99252 99232->99203 99257 c30f2 Shell_NotifyIconW ___scrt_fastfail 99232->99257 99253 c326f 44 API calls ___scrt_fastfail 99233->99253 99254 c18e2 10 API calls 99234->99254 99239->99203 99240 c3263 99240->99231 99242 102e41 99243 c3837 49 API calls 99242->99243 99243->99239 99245 12c276 99244->99245 99246 12c179 ___scrt_fastfail 99244->99246 99245->99231 99247 c3923 24 API calls 99246->99247 99249 12c1a0 99247->99249 99248 12c25f KillTimer SetTimer 99248->99245 99249->99248 99250 12c251 Shell_NotifyIconW 99249->99250 99250->99248 99251->99230 99252->99231 99253->99240 99254->99231 99255->99215 99256->99232 99257->99242 99258->99239 99259->99227 99260 c2e37 99261 ca961 22 API calls 99260->99261 99262 c2e4d 99261->99262 99339 c4ae3 99262->99339 99264 c2e6b 99265 c3a5a 24 API calls 99264->99265 99266 c2e7f 99265->99266 99267 c9cb3 22 API calls 99266->99267 99268 c2e8c 99267->99268 99269 c4ecb 94 API calls 99268->99269 99270 c2ea5 99269->99270 99271 102cb0 99270->99271 99272 c2ead 99270->99272 99273 132cf9 80 API calls 99271->99273 99275 ca8c7 22 API calls 99272->99275 99274 102cc3 99273->99274 99276 102ccf 99274->99276 99278 c4f39 68 API calls 99274->99278 99277 c2ec3 99275->99277 99280 c4f39 68 API calls 99276->99280 99353 c6f88 22 API calls 99277->99353 99278->99276 99282 102ce5 99280->99282 99281 c2ecf 99283 c9cb3 22 API calls 99281->99283 99369 c3084 22 API calls 99282->99369 99284 c2edc 99283->99284 99354 ca81b 41 API calls 99284->99354 99287 c2eec 99289 c9cb3 22 API calls 99287->99289 99288 102d02 99370 c3084 22 API calls 99288->99370 99290 c2f12 99289->99290 99355 ca81b 41 API calls 99290->99355 99293 102d1e 99294 c3a5a 24 API calls 99293->99294 99295 102d44 99294->99295 99371 c3084 22 API calls 99295->99371 99296 c2f21 99299 ca961 22 API calls 99296->99299 99298 102d50 99300 ca8c7 22 API calls 99298->99300 99301 c2f3f 99299->99301 99302 102d5e 99300->99302 99356 c3084 22 API calls 99301->99356 99372 c3084 22 API calls 99302->99372 99305 c2f4b 99357 e4a28 40 API calls 3 library calls 99305->99357 99306 102d6d 99310 ca8c7 22 API calls 99306->99310 99308 c2f59 99308->99282 99309 c2f63 99308->99309 99358 e4a28 40 API calls 3 library calls 99309->99358 99313 102d83 99310->99313 99312 c2f6e 99312->99288 99314 c2f78 99312->99314 99373 c3084 22 API calls 99313->99373 99359 e4a28 40 API calls 3 library calls 99314->99359 99317 102d90 99318 c2f83 99318->99293 99319 c2f8d 99318->99319 99360 e4a28 40 API calls 3 library calls 99319->99360 99321 c2f98 99322 c2fdc 99321->99322 99361 c3084 22 API calls 99321->99361 99322->99306 99323 c2fe8 99322->99323 99323->99317 99363 c63eb 22 API calls 99323->99363 99326 c2fbf 99328 ca8c7 22 API calls 99326->99328 99327 c2ff8 99364 c6a50 22 API calls 99327->99364 99330 c2fcd 99328->99330 99362 c3084 22 API calls 99330->99362 99331 c3006 99365 c70b0 23 API calls 99331->99365 99334 c3021 99337 c3065 99334->99337 99366 c6f88 22 API calls 99334->99366 99367 c70b0 23 API calls 99334->99367 99368 c3084 22 API calls 99334->99368 99340 c4af0 __wsopen_s 99339->99340 99341 c6b57 22 API calls 99340->99341 99342 c4b22 99340->99342 99341->99342 99343 c4c6d 22 API calls 99342->99343 99351 c4b58 99342->99351 99343->99342 99344 c9cb3 22 API calls 99346 c4c52 99344->99346 99345 c9cb3 22 API calls 99345->99351 99347 c515f 22 API calls 99346->99347 99350 c4c5e 99347->99350 99348 c4c6d 22 API calls 99348->99351 99349 c515f 22 API calls 99349->99351 99350->99264 99351->99345 99351->99348 99351->99349 99352 c4c29 99351->99352 99352->99344 99352->99350 99353->99281 99354->99287 99355->99296 99356->99305 99357->99308 99358->99312 99359->99318 99360->99321 99361->99326 99362->99322 99363->99327 99364->99331 99365->99334 99366->99334 99367->99334 99368->99334 99369->99288 99370->99293 99371->99298 99372->99306 99373->99317 99374 c1033 99379 c4c91 99374->99379 99378 c1042 99380 ca961 22 API calls 99379->99380 99381 c4cff 99380->99381 99387 c3af0 99381->99387 99384 c4d9c 99385 c1038 99384->99385 99390 c51f7 22 API calls __fread_nolock 99384->99390 99386 e00a3 29 API calls __onexit 99385->99386 99386->99378 99391 c3b1c 99387->99391 99390->99384 99392 c3b29 99391->99392 99394 c3b0f 99391->99394 99393 c3b30 RegOpenKeyExW 99392->99393 99392->99394 99393->99394 99395 c3b4a RegQueryValueExW 99393->99395 99394->99384 99396 c3b6b 99395->99396 99397 c3b80 RegCloseKey 99395->99397 99396->99397 99397->99394

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 234 c42de-c434d call ca961 GetVersionExW call c6b57 239 103617-10362a 234->239 240 c4353 234->240 241 10362b-10362f 239->241 242 c4355-c4357 240->242 243 103631 241->243 244 103632-10363e 241->244 245 c435d-c43bc call c93b2 call c37a0 242->245 246 103656 242->246 243->244 244->241 247 103640-103642 244->247 260 c43c2-c43c4 245->260 261 1037df-1037e6 245->261 250 10365d-103660 246->250 247->242 249 103648-10364f 247->249 249->239 252 103651 249->252 253 103666-1036a8 250->253 254 c441b-c4435 GetCurrentProcess IsWow64Process 250->254 252->246 253->254 259 1036ae-1036b1 253->259 257 c4494-c449a 254->257 258 c4437 254->258 262 c443d-c4449 257->262 258->262 263 1036b3-1036bd 259->263 264 1036db-1036e5 259->264 260->250 267 c43ca-c43dd 260->267 268 103806-103809 261->268 269 1037e8 261->269 272 c444f-c445e LoadLibraryA 262->272 273 103824-103828 GetSystemInfo 262->273 265 1036ca-1036d6 263->265 266 1036bf-1036c5 263->266 270 1036e7-1036f3 264->270 271 1036f8-103702 264->271 265->254 266->254 274 103726-10372f 267->274 275 c43e3-c43e5 267->275 279 1037f4-1037fc 268->279 280 10380b-10381a 268->280 276 1037ee 269->276 270->254 277 103704-103710 271->277 278 103715-103721 271->278 281 c449c-c44a6 GetSystemInfo 272->281 282 c4460-c446e GetProcAddress 272->282 286 103731-103737 274->286 287 10373c-103748 274->287 284 c43eb-c43ee 275->284 285 10374d-103762 275->285 276->279 277->254 278->254 279->268 280->276 288 10381c-103822 280->288 283 c4476-c4478 281->283 282->281 289 c4470-c4474 GetNativeSystemInfo 282->289 294 c447a-c447b FreeLibrary 283->294 295 c4481-c4493 283->295 290 103791-103794 284->290 291 c43f4-c440f 284->291 292 103764-10376a 285->292 293 10376f-10377b 285->293 286->254 287->254 288->279 289->283 290->254 298 10379a-1037c1 290->298 296 103780-10378c 291->296 297 c4415 291->297 292->254 293->254 294->295 296->254 297->254 299 1037c3-1037c9 298->299 300 1037ce-1037da 298->300 299->254 300->254
                                                APIs
                                                • GetVersionExW.KERNEL32(?), ref: 000C430D
                                                  • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                                • GetCurrentProcess.KERNEL32(?,0015CB64,00000000,?,?), ref: 000C4422
                                                • IsWow64Process.KERNEL32(00000000,?,?), ref: 000C4429
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 000C4454
                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 000C4466
                                                • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 000C4474
                                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 000C447B
                                                • GetSystemInfo.KERNEL32(?,?,?), ref: 000C44A0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                • API String ID: 3290436268-3101561225
                                                • Opcode ID: 89a9e3794f05b0c33ef255546a4d712eede50411ed1e04d8f0ca75e8dc84c6f8
                                                • Instruction ID: db7587102a40a58df5881e0f1bc71648e5fcf250f3e98e4bbb80a9438556a350
                                                • Opcode Fuzzy Hash: 89a9e3794f05b0c33ef255546a4d712eede50411ed1e04d8f0ca75e8dc84c6f8
                                                • Instruction Fuzzy Hash: 3FA18376D0A3C2FFC716CB6A78416AD7FB87B26320B18449ED49197E62D36047C8CB61

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 442 c3170-c3185 443 c31e5-c31e7 442->443 444 c3187-c318a 442->444 443->444 445 c31e9 443->445 446 c318c-c3193 444->446 447 c31eb 444->447 448 c31d0-c31d8 NtdllDefWindowProc_W 445->448 451 c3199-c319e 446->451 452 c3265-c326d PostQuitMessage 446->452 449 102dfb-102e23 call c18e2 call de499 447->449 450 c31f1-c31f6 447->450 459 c31de-c31e4 448->459 488 102e28-102e2f 449->488 454 c321d-c3244 SetTimer RegisterClipboardFormatW 450->454 455 c31f8-c31fb 450->455 457 c31a4-c31a8 451->457 458 102e7c-102e90 call 12bf30 451->458 453 c3219-c321b 452->453 453->459 454->453 463 c3246-c3251 CreatePopupMenu 454->463 460 102d9c-102d9f 455->460 461 c3201-c3214 KillTimer call c30f2 call c3c50 455->461 464 c31ae-c31b3 457->464 465 102e68-102e72 call 12c161 457->465 458->453 483 102e96 458->483 467 102da1-102da5 460->467 468 102dd7-102df6 MoveWindow 460->468 461->453 463->453 472 c31b9-c31be 464->472 473 102e4d-102e54 464->473 479 102e77 465->479 475 102dc6-102dd2 SetFocus 467->475 476 102da7-102daa 467->476 468->453 481 c31c4-c31ca 472->481 482 c3253-c3263 call c326f 472->482 473->448 477 102e5a-102e63 call 120ad7 473->477 475->453 476->481 484 102db0-102dc1 call c18e2 476->484 477->448 479->453 481->448 481->488 482->453 483->448 484->453 488->448 492 102e35-102e48 call c30f2 call c3837 488->492 492->448
                                                APIs
                                                • NtdllDefWindowProc_W.NTDLL(?,?,?,?,?,?,?,?,?,000C316A,?,?), ref: 000C31D8
                                                • KillTimer.USER32(?,00000001,?,?,?,?,?,000C316A,?,?), ref: 000C3204
                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 000C3227
                                                • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 000C3232
                                                • CreatePopupMenu.USER32 ref: 000C3246
                                                • PostQuitMessage.USER32(00000000), ref: 000C3267
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Timer$ClipboardCreateFormatKillMenuMessageNtdllPopupPostProc_QuitRegisterWindow
                                                • String ID: TaskbarCreated
                                                • API String ID: 157504867-2362178303
                                                • Opcode ID: cb46c58e6f1c2bbcd426eaec965165d7bafa7c7d0d5f2b07c52a5e548869d478
                                                • Instruction ID: cd355492a345d4dfcc7de5553b5c1b6df36b864a425c3d3cd418806d0746e26f
                                                • Opcode Fuzzy Hash: cb46c58e6f1c2bbcd426eaec965165d7bafa7c7d0d5f2b07c52a5e548869d478
                                                • Instruction Fuzzy Hash: CF41F835264305BEDF251B789D0EFBD3A65E709354F08811EF90196992CB718EC09BA1

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 640 c42a2-c42ba CreateStreamOnHGlobal 641 c42bc-c42d3 FindResourceExW 640->641 642 c42da-c42dd 640->642 643 c42d9 641->643 644 1035ba-1035c9 LoadResource 641->644 643->642 644->643 645 1035cf-1035dd SizeofResource 644->645 645->643 646 1035e3-1035ee LockResource 645->646 646->643 647 1035f4-103612 646->647 647->643
                                                APIs
                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 000C42B2
                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,000C50AA,?,?,00000000,00000000), ref: 000C42C9
                                                • LoadResource.KERNEL32(?,00000000,?,?,000C50AA,?,?,00000000,00000000,?,?,?,?,?,?,000C4F20), ref: 001035BE
                                                • SizeofResource.KERNEL32(?,00000000,?,?,000C50AA,?,?,00000000,00000000,?,?,?,?,?,?,000C4F20), ref: 001035D3
                                                • LockResource.KERNEL32(000C50AA,?,?,000C50AA,?,?,00000000,00000000,?,?,?,?,?,?,000C4F20,?), ref: 001035E6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                • String ID: SCRIPT
                                                • API String ID: 3051347437-3967369404
                                                • Opcode ID: d76a7e9d54f7317ce1fcaadf43784a9dcaf41a1448cac42d0c233214586b4fe7
                                                • Instruction ID: 82bd68b8611ed767056485405dd692ce703ab16ce168d5a52986b413788a9dbf
                                                • Opcode Fuzzy Hash: d76a7e9d54f7317ce1fcaadf43784a9dcaf41a1448cac42d0c233214586b4fe7
                                                • Instruction Fuzzy Hash: 6F117C70600700FFD7218F65DC49F2B7BB9EBC5B52F20416DB8169A6A0DB71D840DA60

                                                Control-flow Graph

                                                APIs
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 000C2B6B
                                                  • Part of subcall function 000C3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00191418,?,000C2E7F,?,?,?,00000000), ref: 000C3A78
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                • GetForegroundWindow.USER32(runas,?,?,?,?,?,00182224), ref: 00102C10
                                                • ShellExecuteW.SHELL32(00000000,?,?,00182224), ref: 00102C17
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                • String ID: runas
                                                • API String ID: 448630720-4000483414
                                                • Opcode ID: 1e82341ac37c2fd391e96e21a2517795ed3432556806245a90241ee79d4a68ba
                                                • Instruction ID: 679c2b2f75c00d100f84de83dfcfcf83a512bd1902dfed9549f553438934faa0
                                                • Opcode Fuzzy Hash: 1e82341ac37c2fd391e96e21a2517795ed3432556806245a90241ee79d4a68ba
                                                • Instruction Fuzzy Hash: 7311E631208342AACB14FF60D896FFEBBA5AF95300F44542DF082174A3CF318A8AC752
                                                APIs
                                                • lstrlenW.KERNEL32(?,00105222), ref: 0012DBCE
                                                • GetFileAttributesW.KERNELBASE(?), ref: 0012DBDD
                                                • FindFirstFileW.KERNELBASE(?,?), ref: 0012DBEE
                                                • FindClose.KERNEL32(00000000), ref: 0012DBFA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: FileFind$AttributesCloseFirstlstrlen
                                                • String ID:
                                                • API String ID: 2695905019-0
                                                • Opcode ID: def91458aadf37262f6dc29bf64214f0161d874ae701f306d898c94f327c03a1
                                                • Instruction ID: c370d8df1162d1e897619221db79ca135d4e1cc66fae14f974dc8b436ed284cc
                                                • Opcode Fuzzy Hash: def91458aadf37262f6dc29bf64214f0161d874ae701f306d898c94f327c03a1
                                                • Instruction Fuzzy Hash: B1F0A030810B209B82246F78FC0D8AA376D9F02336B10470AF836D24E0EBB059B4C6D6
                                                APIs
                                                • GetInputState.USER32 ref: 000CD807
                                                • timeGetTime.WINMM ref: 000CDA07
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 000CDB28
                                                • TranslateMessage.USER32(?), ref: 000CDB7B
                                                • DispatchMessageW.USER32(?), ref: 000CDB89
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 000CDB9F
                                                • Sleep.KERNEL32(0000000A), ref: 000CDBB1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                • String ID:
                                                • API String ID: 2189390790-0
                                                • Opcode ID: 2914577df9b47b9adf8b3a46f1f212a007013762631a3689439627b3f8d1da12
                                                • Instruction ID: 55cee646107b16d88bcb72dce43a50625d4022677e09d370cec81926d059cb38
                                                • Opcode Fuzzy Hash: 2914577df9b47b9adf8b3a46f1f212a007013762631a3689439627b3f8d1da12
                                                • Instruction Fuzzy Hash: 2642AE30608342EFD728DF24C885FAEB7E1BF86304F14456EE5568B692D770A894DB92

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 301 10065b-10068b call 10042f 304 1006a6-1006b2 call f5221 301->304 305 10068d-100698 call ef2c6 301->305 310 1006b4-1006c9 call ef2c6 call ef2d9 304->310 311 1006cb-100714 call 10039a 304->311 312 10069a-1006a1 call ef2d9 305->312 310->312 321 100781-10078a GetFileType 311->321 322 100716-10071f 311->322 319 10097d-100983 312->319 323 1007d3-1007d6 321->323 324 10078c-1007bd GetLastError call ef2a3 CloseHandle 321->324 326 100721-100725 322->326 327 100756-10077c GetLastError call ef2a3 322->327 330 1007d8-1007dd 323->330 331 1007df-1007e5 323->331 324->312 338 1007c3-1007ce call ef2d9 324->338 326->327 332 100727-100754 call 10039a 326->332 327->312 335 1007e9-100837 call f516a 330->335 331->335 336 1007e7 331->336 332->321 332->327 343 100847-10086b call 10014d 335->343 344 100839-100845 call 1005ab 335->344 336->335 338->312 351 10086d 343->351 352 10087e-1008c1 343->352 344->343 350 10086f-100879 call f86ae 344->350 350->319 351->350 354 1008e2-1008f0 352->354 355 1008c3-1008c7 352->355 358 1008f6-1008fa 354->358 359 10097b 354->359 355->354 357 1008c9-1008dd 355->357 357->354 358->359 360 1008fc-10092f CloseHandle call 10039a 358->360 359->319 363 100931-10095d GetLastError call ef2a3 call f5333 360->363 364 100963-100977 360->364 363->364 364->359
                                                APIs
                                                  • Part of subcall function 0010039A: CreateFileW.KERNELBASE(00000000,00000000,?,00100704,?,?,00000000,?,00100704,00000000,0000000C), ref: 001003B7
                                                • GetLastError.KERNEL32 ref: 0010076F
                                                • __dosmaperr.LIBCMT ref: 00100776
                                                • GetFileType.KERNELBASE(00000000), ref: 00100782
                                                • GetLastError.KERNEL32 ref: 0010078C
                                                • __dosmaperr.LIBCMT ref: 00100795
                                                • CloseHandle.KERNEL32(00000000), ref: 001007B5
                                                • CloseHandle.KERNEL32(?), ref: 001008FF
                                                • GetLastError.KERNEL32 ref: 00100931
                                                • __dosmaperr.LIBCMT ref: 00100938
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                • String ID: H
                                                • API String ID: 4237864984-2852464175
                                                • Opcode ID: 25838155a07724deea7506e28cf2246fd269850ebacd07b7104b1603ccda9686
                                                • Instruction ID: 1323a7bc6bad1d214352c7f7926564c9b0b1155769eef22b43f1cade7152fca9
                                                • Opcode Fuzzy Hash: 25838155a07724deea7506e28cf2246fd269850ebacd07b7104b1603ccda9686
                                                • Instruction Fuzzy Hash: 86A12732A002488FDF1AAF68DC51BAD7BA0EB0A320F14415EF855AF3D2D7759D52CB91

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 000C3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00191418,?,000C2E7F,?,?,?,00000000), ref: 000C3A78
                                                  • Part of subcall function 000C3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 000C3379
                                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 000C356A
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0010318D
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 001031CE
                                                • RegCloseKey.ADVAPI32(?), ref: 00103210
                                                • _wcslen.LIBCMT ref: 00103277
                                                • _wcslen.LIBCMT ref: 00103286
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                • API String ID: 98802146-2727554177
                                                • Opcode ID: 025a892ac07e1468f3970f221cb4fa57d2ca64367894726609522501b5b17cef
                                                • Instruction ID: af32e742863418d70d3f016eeb32dd102594d11a6e200a039f543b555654bf6b
                                                • Opcode Fuzzy Hash: 025a892ac07e1468f3970f221cb4fa57d2ca64367894726609522501b5b17cef
                                                • Instruction Fuzzy Hash: 5471A171505301AEC314DF25DC82DAFBBE8FF89340F40452EF495971A1EB709A88CBA1

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 000C2B8E
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 000C2B9D
                                                • LoadIconW.USER32(00000063), ref: 000C2BB3
                                                • LoadIconW.USER32(000000A4), ref: 000C2BC5
                                                • LoadIconW.USER32(000000A2), ref: 000C2BD7
                                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 000C2BEF
                                                • RegisterClassExW.USER32(?), ref: 000C2C40
                                                  • Part of subcall function 000C2CD4: GetSysColorBrush.USER32(0000000F), ref: 000C2D07
                                                  • Part of subcall function 000C2CD4: RegisterClassExW.USER32(00000030), ref: 000C2D31
                                                  • Part of subcall function 000C2CD4: RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 000C2D42
                                                  • Part of subcall function 000C2CD4: LoadIconW.USER32(000000A9), ref: 000C2D85
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Load$Icon$Register$BrushClassColor$ClipboardCursorFormatImage
                                                • String ID: #$0$AutoIt v3
                                                • API String ID: 2880975755-4155596026
                                                • Opcode ID: f4e985a3e25f49e24d66b73e1dff63fd20246cfa61c166f0e8fd7e89ed860d6c
                                                • Instruction ID: fe26e3582c81eb33e1c8bf37f8c71140ac77193b9c675fbedcdc58c8f1bc6d6e
                                                • Opcode Fuzzy Hash: f4e985a3e25f49e24d66b73e1dff63fd20246cfa61c166f0e8fd7e89ed860d6c
                                                • Instruction Fuzzy Hash: 24210770E10319BFDB109FA5EC95AAD7FB4FB48B60F04412BE504A6AA0D7B516C0CF90

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 000C2D07
                                                • RegisterClassExW.USER32(00000030), ref: 000C2D31
                                                • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 000C2D42
                                                • LoadIconW.USER32(000000A9), ref: 000C2D85
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Register$BrushClassClipboardColorFormatIconLoad
                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                • API String ID: 975902462-1005189915
                                                • Opcode ID: 67de3d04cbce7eaac04c98d75b28353ac3b286e51f674e27bc55d62b0453c15d
                                                • Instruction ID: be21fe7e0f91b3c0d721edfd9c1b17c86909716ac55c3459bb1d50b7e0575016
                                                • Opcode Fuzzy Hash: 67de3d04cbce7eaac04c98d75b28353ac3b286e51f674e27bc55d62b0453c15d
                                                • Instruction Fuzzy Hash: C621F2B5901309EFDB00DFA4EC89BDDBBB4FB08706F00811AF911AAAA0D7B10584CF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 502 f8d45-f8d55 503 f8d6f-f8d71 502->503 504 f8d57-f8d6a call ef2c6 call ef2d9 502->504 506 f90d9-f90e6 call ef2c6 call ef2d9 503->506 507 f8d77-f8d7d 503->507 520 f90f1 504->520 526 f90ec call f27ec 506->526 507->506 510 f8d83-f8dae 507->510 510->506 513 f8db4-f8dbd 510->513 516 f8dbf-f8dd2 call ef2c6 call ef2d9 513->516 517 f8dd7-f8dd9 513->517 516->526 518 f8ddf-f8de3 517->518 519 f90d5-f90d7 517->519 518->519 524 f8de9-f8ded 518->524 525 f90f4-f90f9 519->525 520->525 524->516 528 f8def-f8e06 524->528 526->520 531 f8e08-f8e0b 528->531 532 f8e23-f8e2c 528->532 533 f8e0d-f8e13 531->533 534 f8e15-f8e1e 531->534 535 f8e2e-f8e45 call ef2c6 call ef2d9 call f27ec 532->535 536 f8e4a-f8e54 532->536 533->534 533->535 539 f8ebf-f8ed9 534->539 564 f900c 535->564 537 f8e5b-f8e79 call f3820 call f29c8 * 2 536->537 538 f8e56-f8e58 536->538 573 f8e7b-f8e91 call ef2d9 call ef2c6 537->573 574 f8e96-f8ebc call f9424 537->574 538->537 541 f8edf-f8eef 539->541 542 f8fad-f8fb6 call ff89b 539->542 541->542 545 f8ef5-f8ef7 541->545 553 f9029 542->553 554 f8fb8-f8fca 542->554 545->542 549 f8efd-f8f23 545->549 549->542 556 f8f29-f8f3c 549->556 562 f902d-f9045 ReadFile 553->562 554->553 558 f8fcc-f8fdb GetConsoleMode 554->558 556->542 560 f8f3e-f8f40 556->560 558->553 563 f8fdd-f8fe1 558->563 560->542 565 f8f42-f8f6d 560->565 567 f9047-f904d 562->567 568 f90a1-f90ac GetLastError 562->568 563->562 570 f8fe3-f8ffd ReadConsoleW 563->570 571 f900f-f9019 call f29c8 564->571 565->542 572 f8f6f-f8f82 565->572 567->568 569 f904f 567->569 575 f90ae-f90c0 call ef2d9 call ef2c6 568->575 576 f90c5-f90c8 568->576 578 f9052-f9064 569->578 580 f8fff GetLastError 570->580 581 f901e-f9027 570->581 571->525 572->542 585 f8f84-f8f86 572->585 573->564 574->539 575->564 582 f90ce-f90d0 576->582 583 f9005-f900b call ef2a3 576->583 578->571 588 f9066-f906a 578->588 580->583 581->578 582->571 583->564 585->542 592 f8f88-f8fa8 585->592 595 f906c-f907c call f8a61 588->595 596 f9083-f908e 588->596 592->542 607 f907f-f9081 595->607 601 f909a-f909f call f88a1 596->601 602 f9090 call f8bb1 596->602 608 f9095-f9098 601->608 602->608 607->571 608->607
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0ec8ee899dee97235725bf44d8dcb8f850b44b6e7ac0465fc1b90593e07ca45a
                                                • Instruction ID: f4620254c9cda82750f10020c4ea78bdfd56a5575b2e9d3cc398cde1e1b3ec0a
                                                • Opcode Fuzzy Hash: 0ec8ee899dee97235725bf44d8dcb8f850b44b6e7ac0465fc1b90593e07ca45a
                                                • Instruction Fuzzy Hash: 84C1F175A0434DAFCB61DFA9D841BFDBBF0AF09310F044099EA14A7792CB359941EB60

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 610 be5ca8-be5cfa call be5ba8 CreateFileW 613 be5cfc-be5cfe 610->613 614 be5d03-be5d10 610->614 615 be5e5c-be5e60 613->615 617 be5d12-be5d1e 614->617 618 be5d23-be5d3a VirtualAlloc 614->618 617->615 619 be5d3c-be5d3e 618->619 620 be5d43-be5d69 CreateFileW 618->620 619->615 622 be5d8d-be5da7 ReadFile 620->622 623 be5d6b-be5d88 620->623 624 be5dcb-be5dcf 622->624 625 be5da9-be5dc6 622->625 623->615 626 be5df0-be5e07 WriteFile 624->626 627 be5dd1-be5dee 624->627 625->615 630 be5e09-be5e30 626->630 631 be5e32-be5e57 CloseHandle VirtualFree 626->631 627->615 630->615 631->615
                                                APIs
                                                • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00BE5CED
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755722286.0000000000BE5000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BE5000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_be5000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CreateFile
                                                • String ID:
                                                • API String ID: 823142352-0
                                                • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                • Instruction ID: 9d312d158b93e546053bbb21d467e92678646e463675eb29c1b3dd6aa949438d
                                                • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                • Instruction Fuzzy Hash: 91510575A50248FBEB30DFA4CC99FEE77B8AF48704F108554F61AEA1C0DB749A449B60

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 650 c2c63-c2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                APIs
                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 000C2C91
                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 000C2CB2
                                                • ShowWindow.USER32(00000000,?,?,?,?,?,?,000C1CAD,?), ref: 000C2CC6
                                                • ShowWindow.USER32(00000000,?,?,?,?,?,?,000C1CAD,?), ref: 000C2CCF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$CreateShow
                                                • String ID: AutoIt v3$edit
                                                • API String ID: 1584632944-3779509399
                                                • Opcode ID: c2a1766012652c63616c3f8a17f2384799addf727d85c704eb20f6d8e0103e20
                                                • Instruction ID: 555858e77866bac33c99a308619502770e0a3a0de833dc73a82619dd23d1d54b
                                                • Opcode Fuzzy Hash: c2a1766012652c63616c3f8a17f2384799addf727d85c704eb20f6d8e0103e20
                                                • Instruction Fuzzy Hash: C7F0DA75540391BEEB311B27AC08E773EBDE7CAF61B00005AFD14A69A0C67119D4DAB1

                                                Control-flow Graph

                                                APIs
                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00132C05
                                                • DeleteFileW.KERNEL32(?), ref: 00132C87
                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00132C9D
                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00132CAE
                                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00132CC0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: File$Delete$Copy
                                                • String ID:
                                                • API String ID: 3226157194-0
                                                • Opcode ID: adcbd78d34fbf0e8ea75d71a1391f56fbed1cadabd67263ffd9d05c6caca5e64
                                                • Instruction ID: 5db6f64145b6b56708e248a67074fe9f27521201156035cde84fd611e3f5d900
                                                • Opcode Fuzzy Hash: adcbd78d34fbf0e8ea75d71a1391f56fbed1cadabd67263ffd9d05c6caca5e64
                                                • Instruction Fuzzy Hash: 38B12E71900219AFDF25EBA4CC85EDEB77DEF49350F1040A6F509E6156EB30AA448F61

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 871 1ed6f0-1ed6fd 872 1ed70a-1ed70f 871->872 873 1ed711 872->873 874 1ed713 873->874 875 1ed700-1ed705 873->875 877 1ed718-1ed71a 874->877 876 1ed706-1ed708 875->876 876->872 876->873 878 1ed71c-1ed721 877->878 879 1ed723-1ed727 877->879 878->879 880 1ed729 879->880 881 1ed734-1ed737 879->881 882 1ed72b-1ed732 880->882 883 1ed753-1ed758 880->883 884 1ed739-1ed73e 881->884 885 1ed740-1ed742 881->885 882->881 882->883 886 1ed75a-1ed763 883->886 887 1ed76b-1ed76d 883->887 884->885 885->877 888 1ed7da-1ed7dd 886->888 889 1ed765-1ed769 886->889 890 1ed76f-1ed774 887->890 891 1ed776 887->891 892 1ed7e2-1ed7e5 888->892 889->891 890->891 893 1ed778-1ed77b 891->893 894 1ed744-1ed746 891->894 895 1ed7e7-1ed7e9 892->895 896 1ed77d-1ed782 893->896 897 1ed784 893->897 898 1ed74f-1ed751 894->898 899 1ed748-1ed74d 894->899 895->892 900 1ed7eb-1ed7ee 895->900 896->897 897->894 901 1ed786-1ed788 897->901 902 1ed7a5-1ed7b4 898->902 899->898 900->892 903 1ed7f0-1ed80c 900->903 904 1ed78a-1ed78f 901->904 905 1ed791-1ed795 901->905 906 1ed7b6-1ed7bd 902->906 907 1ed7c4-1ed7d1 902->907 903->895 910 1ed80e 903->910 904->905 905->901 911 1ed797 905->911 906->906 908 1ed7bf 906->908 907->907 909 1ed7d3-1ed7d5 907->909 908->876 909->876 912 1ed814-1ed818 910->912 913 1ed799-1ed7a0 911->913 914 1ed7a2 911->914 915 1ed85f-1ed862 912->915 916 1ed81a-1ed830 LoadLibraryA 912->916 913->901 913->914 914->902 917 1ed865-1ed86c 915->917 918 1ed831-1ed836 916->918 919 1ed86e-1ed870 917->919 920 1ed890-1ed8c0 VirtualProtect * 2 917->920 918->912 921 1ed838-1ed83a 918->921 922 1ed872-1ed881 919->922 923 1ed883-1ed88e 919->923 924 1ed8c4-1ed8c8 920->924 925 1ed83c-1ed842 921->925 926 1ed843-1ed850 GetProcAddress 921->926 922->917 923->922 924->924 927 1ed8ca 924->927 925->926 928 1ed859 ExitProcess 926->928 929 1ed852-1ed857 926->929 929->918
                                                APIs
                                                • LoadLibraryA.KERNEL32(?), ref: 001ED82A
                                                • GetProcAddress.KERNEL32(?,001E6FF9), ref: 001ED848
                                                • ExitProcess.KERNEL32(?,001E6FF9), ref: 001ED859
                                                • VirtualProtect.KERNELBASE(000C0000,00001000,00000004,?,00000000), ref: 001ED8A7
                                                • VirtualProtect.KERNELBASE(000C0000,00001000), ref: 001ED8BC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual$AddressExitLibraryLoadProcProcess
                                                • String ID:
                                                • API String ID: 1996367037-0
                                                • Opcode ID: 6bec9d84b91a0698e667e8acdc2c68004ce57d8dcd60e4fe82b50a6ab010d0f8
                                                • Instruction ID: 3e4e6a909ffd767403bc18687672b1cc9f90187708e353cc92edb73033634b5b
                                                • Opcode Fuzzy Hash: 6bec9d84b91a0698e667e8acdc2c68004ce57d8dcd60e4fe82b50a6ab010d0f8
                                                • Instruction Fuzzy Hash: 31514672E44AD24BD7248FB9ECC067CB7A1EB413287280738D9E5CB3C5E7A45C0583A0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 930 be7738-be786e call be5388 call be7628 CreateFileW 937 be7875-be7885 930->937 938 be7870 930->938 941 be788c-be78a6 VirtualAlloc 937->941 942 be7887 937->942 939 be7942-be7947 938->939 943 be78ad-be78c4 ReadFile 941->943 944 be78a8 941->944 942->939 945 be78c8-be78dd call be63f8 943->945 946 be78c6 943->946 944->939 948 be78e2-be791c call be7668 call be6628 945->948 946->939 953 be791e-be7933 call be76b8 948->953 954 be7938-be7940 948->954 953->954 954->939
                                                APIs
                                                  • Part of subcall function 00BE7628: Sleep.KERNELBASE(000001F4), ref: 00BE7639
                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00BE7864
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755722286.0000000000BE5000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BE5000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_be5000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CreateFileSleep
                                                • String ID: 3ZQ7X87J0LXED3D3NH3F6
                                                • API String ID: 2694422964-1374027123
                                                • Opcode ID: cd23815cbdc0e9b7590287a65be7c2a1eb7ed846ba61b65b1b70e5ab78ace1b6
                                                • Instruction ID: 35932aa288e0ed3e2d7ee7a8d4582b1301a6fb5fdf4f8b3c0b34670afe0cadd3
                                                • Opcode Fuzzy Hash: cd23815cbdc0e9b7590287a65be7c2a1eb7ed846ba61b65b1b70e5ab78ace1b6
                                                • Instruction Fuzzy Hash: 2B519530D08288EBEF11D7B4C859BEEBBB9AF15304F104199E2447B2C1DBB90B45CBA5
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,000C3B0F,SwapMouseButtons,00000004,?), ref: 000C3B40
                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,000C3B0F,SwapMouseButtons,00000004,?), ref: 000C3B61
                                                • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,000C3B0F,SwapMouseButtons,00000004,?), ref: 000C3B83
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CloseOpenQueryValue
                                                • String ID: Control Panel\Mouse
                                                • API String ID: 3677997916-824357125
                                                • Opcode ID: 97fb02fb39f1050f6d84a9fb68eb34c8ed1313218f22f1c37adb634a02781225
                                                • Instruction ID: f4b6254dbcab8f999431eebd78de3660539647761d391235f085f1c03dc3d8bd
                                                • Opcode Fuzzy Hash: 97fb02fb39f1050f6d84a9fb68eb34c8ed1313218f22f1c37adb634a02781225
                                                • Instruction Fuzzy Hash: 66112AB5520208FFDB608FA5DC44EEFB7BCEF44755B108459BA05D7150D3319E409BA0
                                                Strings
                                                • Variable must be of type 'Object'., xrefs: 001132B7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Variable must be of type 'Object'.
                                                • API String ID: 0-109567571
                                                • Opcode ID: 11f0ef5e6096cb6a1383a3fe1a4852530172258d8570414d05091d81de6cc74b
                                                • Instruction ID: 3c885b7e4b923f43e77c9e48ea490a606b9a477d18cb04c283dcec7ff286de78
                                                • Opcode Fuzzy Hash: 11f0ef5e6096cb6a1383a3fe1a4852530172258d8570414d05091d81de6cc74b
                                                • Instruction Fuzzy Hash: 2AC26971A00255DFCB24CF58C884FADB7F1BF09310F24816AE916AB396D775AE81CB91
                                                APIs
                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 001033A2
                                                  • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 000C3A04
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: IconLoadNotifyShell_String_wcslen
                                                • String ID: Line:
                                                • API String ID: 2289894680-1585850449
                                                • Opcode ID: b66f4566afc956697d00e24f380eabe068dcc77477ff27b21214949ceb788cc2
                                                • Instruction ID: d24c7d4d8b9e56d99962dacae7caeb79f1e62206e2ea377e4b29f5604a9d7308
                                                • Opcode Fuzzy Hash: b66f4566afc956697d00e24f380eabe068dcc77477ff27b21214949ceb788cc2
                                                • Instruction Fuzzy Hash: 8431C171518305AED725EB20DC46FEFB7E8AB40720F00892EF59993592DB709B89C7C2
                                                APIs
                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 000E0668
                                                  • Part of subcall function 000E32A4: RaiseException.KERNEL32(?,?,?,000E068A,?,00191444,?,?,?,?,?,?,000E068A,000C1129,00188738,000C1129), ref: 000E3304
                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 000E0685
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Exception@8Throw$ExceptionRaise
                                                • String ID: Unknown exception
                                                • API String ID: 3476068407-410509341
                                                • Opcode ID: 7ebbaa5cc9a1f1de4de363476c0e1e696995e2c1dbd0974cf9af060bb7d8e95e
                                                • Instruction ID: 42c8da9bfb702ed683406a43a58495406c7d7ef068cf3c2404e29fc82b78b6bc
                                                • Opcode Fuzzy Hash: 7ebbaa5cc9a1f1de4de363476c0e1e696995e2c1dbd0974cf9af060bb7d8e95e
                                                • Instruction Fuzzy Hash: D2F0C83490038DBBCB10B666D846DDE7BBD5F40310BA04535B924F65D2EFB1DB55CA90
                                                APIs
                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 00BE63CD
                                                • ExitProcess.KERNEL32(00000000), ref: 00BE63EC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755722286.0000000000BE5000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BE5000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_be5000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Process$CreateExit
                                                • String ID: D
                                                • API String ID: 126409537-2746444292
                                                • Opcode ID: 9ec10d9bb68332e7bcdb3756cd9d8bc900757a5150bae08cbb91c2426b35d2e1
                                                • Instruction ID: c1199709379b2cbbe9cb9d7b06fcf7513ae25f1fcfedbce49d13322f3ffa2ed2
                                                • Opcode Fuzzy Hash: 9ec10d9bb68332e7bcdb3756cd9d8bc900757a5150bae08cbb91c2426b35d2e1
                                                • Instruction Fuzzy Hash: 3CF0EC7554424CABDB60EFE5CC89FEE77B8BF04701F508549FA1A9A180EB7896088B61
                                                APIs
                                                • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0013302F
                                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00133044
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Temp$FileNamePath
                                                • String ID: aut
                                                • API String ID: 3285503233-3010740371
                                                • Opcode ID: bb0a4b263bd1f94c1ab6597c5797734549a94ebdea0d5f6888f685b8c736f158
                                                • Instruction ID: cc353d65736244ba903f87a252715e13502367cb71728f32843b77112e07f335
                                                • Opcode Fuzzy Hash: bb0a4b263bd1f94c1ab6597c5797734549a94ebdea0d5f6888f685b8c736f158
                                                • Instruction Fuzzy Hash: 13D05E72500328ABDA20ABA4AC4EFCB7A7CDB04751F0002A1B655E6491EAB09A84CBD0
                                                APIs
                                                • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 001482F5
                                                • TerminateProcess.KERNEL32(00000000), ref: 001482FC
                                                • FreeLibrary.KERNEL32(?,?,?,?), ref: 001484DD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Process$CurrentFreeLibraryTerminate
                                                • String ID:
                                                • API String ID: 146820519-0
                                                • Opcode ID: 51e40b6541dcb768dd776a9bf4538d7f80e6e8dc312fc8718ddfc0aa924a8fbe
                                                • Instruction ID: ebc0b70f34ef5e7419b53a67b2c22787e29e8895df67acefb2fdac245e244274
                                                • Opcode Fuzzy Hash: 51e40b6541dcb768dd776a9bf4538d7f80e6e8dc312fc8718ddfc0aa924a8fbe
                                                • Instruction Fuzzy Hash: D6126B71A083019FC714DF28C484B6EBBE5BF85314F04895DE8998B2A2DB71E946CF92
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a1bb733a135a85681b1f4eee7f4d0102fc3c68305f81493af8b5bd6ae4bc6fc3
                                                • Instruction ID: e7303e2be5812d538c9fd25fbc6f676cb02d9ce3b210ed85360494678844f545
                                                • Opcode Fuzzy Hash: a1bb733a135a85681b1f4eee7f4d0102fc3c68305f81493af8b5bd6ae4bc6fc3
                                                • Instruction Fuzzy Hash: 4451B171D00A0E9FCB219FA5CC45EFEBBB8AF05312F14005AF705A7692D7359A41ABA1
                                                APIs
                                                  • Part of subcall function 000C1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 000C1BF4
                                                  • Part of subcall function 000C1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 000C1BFC
                                                  • Part of subcall function 000C1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 000C1C07
                                                  • Part of subcall function 000C1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 000C1C12
                                                  • Part of subcall function 000C1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 000C1C1A
                                                  • Part of subcall function 000C1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 000C1C22
                                                  • Part of subcall function 000C1B4A: RegisterClipboardFormatW.USER32(00000004), ref: 000C1BA2
                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 000C136A
                                                • OleInitialize.OLE32 ref: 000C1388
                                                • CloseHandle.KERNEL32(00000000,00000000), ref: 001024AB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Virtual$Handle$ClipboardCloseFormatInitializeRegister
                                                • String ID:
                                                • API String ID: 3094916012-0
                                                • Opcode ID: ca3429ecc30586c3609b3b5c4fdc200247b00b86563a80706cd6bead2df5524f
                                                • Instruction ID: 51b19cdaaf0505a943bdb5370a3129b00d8625052b37545a85874a1a374d7769
                                                • Opcode Fuzzy Hash: ca3429ecc30586c3609b3b5c4fdc200247b00b86563a80706cd6bead2df5524f
                                                • Instruction Fuzzy Hash: B271CFB4901303AFE785DF79AA45A993AE1FB8A344357822FD41AD7B62EB3044C5CF41
                                                APIs
                                                  • Part of subcall function 000C3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 000C3A04
                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0012C259
                                                • KillTimer.USER32(?,00000001,?,?), ref: 0012C261
                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0012C270
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_Timer$Kill
                                                • String ID:
                                                • API String ID: 3500052701-0
                                                • Opcode ID: 374989e53cc62e994d269715cb67722fbc4585087790e7ec14ecffe75e30f115
                                                • Instruction ID: 5cf572107fb08a5f805b10cee61c0099c0c8c9fc1a1d09e2f70ac94921ee6cfc
                                                • Opcode Fuzzy Hash: 374989e53cc62e994d269715cb67722fbc4585087790e7ec14ecffe75e30f115
                                                • Instruction Fuzzy Hash: FB31C570904354EFEB26DF64A855BEBBBECAF16304F00049ED2DA97241C7745A84CB91
                                                APIs
                                                • CloseHandle.KERNELBASE(00000000,00000000,?,?,000F85CC,?,00188CC8,0000000C), ref: 000F8704
                                                • GetLastError.KERNEL32(?,000F85CC,?,00188CC8,0000000C), ref: 000F870E
                                                • __dosmaperr.LIBCMT ref: 000F8739
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CloseErrorHandleLast__dosmaperr
                                                • String ID:
                                                • API String ID: 2583163307-0
                                                • Opcode ID: a28971cf563fc162dbc94362d74cb1ba01aff939504861363a9b69eadb4b444d
                                                • Instruction ID: d7169c14a8ec4a80ba0a944bd0e38212085f0bfae8e6ab91dc2ad744c60cd834
                                                • Opcode Fuzzy Hash: a28971cf563fc162dbc94362d74cb1ba01aff939504861363a9b69eadb4b444d
                                                • Instruction Fuzzy Hash: 2E014C336047285AC2A062346C497FE37C54B82779F254119EB04DB9D3DE60CD81A390
                                                APIs
                                                • TranslateMessage.USER32(?), ref: 000CDB7B
                                                • DispatchMessageW.USER32(?), ref: 000CDB89
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 000CDB9F
                                                • Sleep.KERNEL32(0000000A), ref: 000CDBB1
                                                • TranslateAcceleratorW.USER32(?,?,?), ref: 00111CC9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                • String ID:
                                                • API String ID: 3288985973-0
                                                • Opcode ID: 65cc1173bde993173c4c3bedad73afbd2bc4109abb64ba1bb540f94fbc09ae33
                                                • Instruction ID: 506f5838a1ee4ef7f8c55fc901c628f66792f0d6e46a70e4bec5a621fc9da3e3
                                                • Opcode Fuzzy Hash: 65cc1173bde993173c4c3bedad73afbd2bc4109abb64ba1bb540f94fbc09ae33
                                                • Instruction Fuzzy Hash: 33F05430644381EBE734CB60CC45FDE73ACEB44311F504529E60A874C0DB3094C89B65
                                                APIs
                                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00132CD4,?,?,?,00000004,00000001), ref: 00132FF2
                                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00132CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00133006
                                                • CloseHandle.KERNEL32(00000000,?,00132CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0013300D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: File$CloseCreateHandleTime
                                                • String ID:
                                                • API String ID: 3397143404-0
                                                • Opcode ID: 6f1f7fb82512651a8f7bb13fa1cb66c8e638c945cc0bc77cd58ef007664559ea
                                                • Instruction ID: 22f2532761d5082a4e47461fc2e89cf96102b85c9336c17559968974007228c9
                                                • Opcode Fuzzy Hash: 6f1f7fb82512651a8f7bb13fa1cb66c8e638c945cc0bc77cd58ef007664559ea
                                                • Instruction Fuzzy Hash: 2EE08636680714BBD2302B65BC4DF8B3A1CD786B72F104210F7297D0D046A0154142E8
                                                APIs
                                                • __Init_thread_footer.LIBCMT ref: 000D17F6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer
                                                • String ID: CALL
                                                • API String ID: 1385522511-4196123274
                                                • Opcode ID: 3fff2416deaa0d6f9dedea57fed63546307c76c527e1516f8036e271b73765d9
                                                • Instruction ID: 308528c44cec28ed306c58f38d0e974840aa8552e43bc58a9241bddc3e1cd597
                                                • Opcode Fuzzy Hash: 3fff2416deaa0d6f9dedea57fed63546307c76c527e1516f8036e271b73765d9
                                                • Instruction Fuzzy Hash: F1228E70608301EFC714DF14D484AAABBF1BF85314F14856EF49A8B362DB76E985CB62
                                                APIs
                                                • _wcslen.LIBCMT ref: 00136F6B
                                                  • Part of subcall function 000C4ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4EFD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: LibraryLoad_wcslen
                                                • String ID: >>>AUTOIT SCRIPT<<<
                                                • API String ID: 3312870042-2806939583
                                                • Opcode ID: 413ef574ca308b8f000d5713d74a921b8514000d628c856e103fbd50b44edf0e
                                                • Instruction ID: 613b19757730c0cf06fa559c240970f6c235cc8b0ff95b3f00c9fc8017bf250e
                                                • Opcode Fuzzy Hash: 413ef574ca308b8f000d5713d74a921b8514000d628c856e103fbd50b44edf0e
                                                • Instruction Fuzzy Hash: 91B1B4712086019FCB24EF20C491EAEB7E5BF95314F44891DF496972A2EF30ED49CB92
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: __fread_nolock
                                                • String ID: EA06
                                                • API String ID: 2638373210-3962188686
                                                • Opcode ID: 739f87796ca766814d8ae3127831beb3bdeb02efc2ff30bfd5764b86e11dbe8b
                                                • Instruction ID: 03da882357d9e3199a320617618f157acfe8f27bf4d0ac9c59558d6a81c95175
                                                • Opcode Fuzzy Hash: 739f87796ca766814d8ae3127831beb3bdeb02efc2ff30bfd5764b86e11dbe8b
                                                • Instruction Fuzzy Hash: 3401B5729042587EDF18D7A9C856EEEBBF89B05301F00455AE152E2182E5B4E7088B60
                                                APIs
                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 000C3908
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_
                                                • String ID:
                                                • API String ID: 1144537725-0
                                                • Opcode ID: 28e8464e715d84ff62ca00f22613d4b59483b02c22f4d3ea83da3c7ac2be768e
                                                • Instruction ID: e996329e0dbd43ae21edc3b36fa6cb3e57f568df8d932491f2e056a3fa39fd41
                                                • Opcode Fuzzy Hash: 28e8464e715d84ff62ca00f22613d4b59483b02c22f4d3ea83da3c7ac2be768e
                                                • Instruction Fuzzy Hash: 8A319170504301DFD760DF24D885B9BBBF8FB49718F00092EF59987680E7B1AA88CB92
                                                APIs
                                                  • Part of subcall function 00BE5C68: GetFileAttributesW.KERNELBASE(?), ref: 00BE5C73
                                                • CreateDirectoryW.KERNELBASE(?,00000000), ref: 00BE6530
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755722286.0000000000BE5000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BE5000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_be5000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: AttributesCreateDirectoryFile
                                                • String ID:
                                                • API String ID: 3401506121-0
                                                • Opcode ID: 1730ffd7e136448da3323d274787253f549e61aa911ff25593395ed30d78e640
                                                • Instruction ID: 41038801f741c1db19eb8342974aa530053f0b28ec5c33013bf321f1d87772d3
                                                • Opcode Fuzzy Hash: 1730ffd7e136448da3323d274787253f549e61aa911ff25593395ed30d78e640
                                                • Instruction Fuzzy Hash: B751B531A1024D97DF14EFB0C945BEF7379EF68700F0045A8A909E7280EB799B48CBA5
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction ID: 4f479efec71328087c646c863aee5cfc37b03c68b479304e734d2a7594571fe9
                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction Fuzzy Hash: 6431F574A0020ADBC768CF59D580969F7A2FF49304B24D6A6E80ACB755D731EDD1CBE0
                                                APIs
                                                  • Part of subcall function 000C4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,000C4EDD,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4E9C
                                                  • Part of subcall function 000C4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 000C4EAE
                                                  • Part of subcall function 000C4E90: FreeLibrary.KERNEL32(00000000,?,?,000C4EDD,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4EC0
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4EFD
                                                  • Part of subcall function 000C4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00103CDE,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4E62
                                                  • Part of subcall function 000C4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 000C4E74
                                                  • Part of subcall function 000C4E59: FreeLibrary.KERNEL32(00000000,?,?,00103CDE,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4E87
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressFreeProc
                                                • String ID:
                                                • API String ID: 2632591731-0
                                                • Opcode ID: ec7771f3d82d571afe96b9d2030049f3a9d035a227491e6e00d28b7063aa63bb
                                                • Instruction ID: 82070dd278fd2c6fec7ff5b1fd63f1653bbd557ffe39849652b8979407b5d51b
                                                • Opcode Fuzzy Hash: ec7771f3d82d571afe96b9d2030049f3a9d035a227491e6e00d28b7063aa63bb
                                                • Instruction Fuzzy Hash: D511E332610305AADB24FF60DC22FED77A5AF50711F20842EF552AA1D2EFB1AA459790
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: __wsopen_s
                                                • String ID:
                                                • API String ID: 3347428461-0
                                                • Opcode ID: 544b0cd8e59c201a4d4f0d914284f9386aa8299b636b69c2cd36c4c31226f002
                                                • Instruction ID: c98f3178f9e28ae50027352d5168cd0601d15c8055f37839926cfd85a56b326c
                                                • Opcode Fuzzy Hash: 544b0cd8e59c201a4d4f0d914284f9386aa8299b636b69c2cd36c4c31226f002
                                                • Instruction Fuzzy Hash: 5211487590410AAFCB05DF58E9419EE7BF8FF48304F148059F908AB312DB30EA11DBA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                • Instruction ID: f581a561ca329b3a9bce4854d4037c4476bd8fa2bf7fe93f7032546f97956e43
                                                • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                • Instruction Fuzzy Hash: 81F0F432511A9C9ECA313A6BDC05BEA33989F523B4F100716FA20B35D3DB70D80196A5
                                                APIs
                                                • RtlAllocateHeap.NTDLL(00000000,?,00191444), ref: 000F3852
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: AllocateHeap
                                                • String ID:
                                                • API String ID: 1279760036-0
                                                • Opcode ID: dcbf13906800e252306d2841bf747753c0ac3232d4fe320570f822de82ff811f
                                                • Instruction ID: 83955f0597e0c6aab9be7531c696f51e6a4da2896ce8deffb275a942b3965516
                                                • Opcode Fuzzy Hash: dcbf13906800e252306d2841bf747753c0ac3232d4fe320570f822de82ff811f
                                                • Instruction Fuzzy Hash: 5CE0E53110036DAAD6712A779D01BFA36C8AB42BF0F090021BE04A6E81DF19DE03A1E0
                                                APIs
                                                • FreeLibrary.KERNEL32(?,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4F6D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: FreeLibrary
                                                • String ID:
                                                • API String ID: 3664257935-0
                                                • Opcode ID: fcff1a59b8c429fda39caf9a41e32ef10f982e4afe1487452235ca5f4389f515
                                                • Instruction ID: 9fe2efde7b695aad62b140791c359ee0754f92812b66b0fa0f9f41747cccc1f0
                                                • Opcode Fuzzy Hash: fcff1a59b8c429fda39caf9a41e32ef10f982e4afe1487452235ca5f4389f515
                                                • Instruction Fuzzy Hash: 5EF03971105752CFDB349F64D4A0E6ABBE4BF14329320897EE1EA82621CB319885DF50
                                                APIs
                                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 000C2DC4
                                                  • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: LongNamePath_wcslen
                                                • String ID:
                                                • API String ID: 541455249-0
                                                • Opcode ID: 84bf0497927011b3c2d2ab31c8d1c23799f2231a241cacf36fcd3355976e0aac
                                                • Instruction ID: 8eeb0c6cbfad30ec64d43f42d9a94b49a7cbd55a8abe81d4788ed978a1c7198f
                                                • Opcode Fuzzy Hash: 84bf0497927011b3c2d2ab31c8d1c23799f2231a241cacf36fcd3355976e0aac
                                                • Instruction Fuzzy Hash: 37E0C272A002246BCB20E7989C06FEA77EDDFC8790F0400B5FD09E7248DAA4ADC48690
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: __fread_nolock
                                                • String ID:
                                                • API String ID: 2638373210-0
                                                • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                • Instruction ID: 48e17dec2b32bcca8174410b28f9e0e497ca377802f614f5a08ff54266a67b39
                                                • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                • Instruction Fuzzy Hash: 12E048F06097005FDF396A28A9517F677D49F49300F10045EF59F93252E6726845865D
                                                APIs
                                                  • Part of subcall function 000C3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 000C3908
                                                  • Part of subcall function 000CD730: GetInputState.USER32 ref: 000CD807
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 000C2B6B
                                                  • Part of subcall function 000C30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 000C314E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                • String ID:
                                                • API String ID: 3667716007-0
                                                • Opcode ID: b9288d1cf56e3adf427b2555f6f1a10e82506f6d37c3cca91622fffb789a7043
                                                • Instruction ID: be1fc837e0f7f3d01c25b24c65a8b706fe8941f4676c93dc0b1eb71c3887bf43
                                                • Opcode Fuzzy Hash: b9288d1cf56e3adf427b2555f6f1a10e82506f6d37c3cca91622fffb789a7043
                                                • Instruction Fuzzy Hash: 26E0862230434516CA04BB74A856FFDB7599BD5351F40553EF142471A3DF2489CA4251
                                                APIs
                                                • GetFileAttributesW.KERNELBASE(?), ref: 00BE5C73
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755722286.0000000000BE5000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BE5000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_be5000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: AttributesFile
                                                • String ID:
                                                • API String ID: 3188754299-0
                                                • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                • Instruction ID: f5d61460a7f3a2ca1e5d6001504ce252a46ff57574f3e9a18ef2d291ec199664
                                                • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                • Instruction Fuzzy Hash: BBE08C30915B88EBCB20CAA98D54AA973E8EB04324F204A94A806C7380E6309E00E750
                                                APIs
                                                • CreateFileW.KERNELBASE(00000000,00000000,?,00100704,?,?,00000000,?,00100704,00000000,0000000C), ref: 001003B7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CreateFile
                                                • String ID:
                                                • API String ID: 823142352-0
                                                • Opcode ID: b361be10b0e00002bae87d68e464da797d7746894510e8ec70cf6ac496f1c008
                                                • Instruction ID: 2e89f02ddee3c7705cc33bc6bc8e645745fc4774387fc3c987b322dc5e6a8ec4
                                                • Opcode Fuzzy Hash: b361be10b0e00002bae87d68e464da797d7746894510e8ec70cf6ac496f1c008
                                                • Instruction Fuzzy Hash: 8CD06C3204020DFFDF029F84DD46EDA3BAAFB48714F014000BE185A020C732E861AB90
                                                APIs
                                                • GetFileAttributesW.KERNELBASE(?), ref: 00BE5C43
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755722286.0000000000BE5000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BE5000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_be5000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: AttributesFile
                                                • String ID:
                                                • API String ID: 3188754299-0
                                                • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                • Instruction ID: a33d2b8e6124ad674301200caefe332ef9ef9d978fd3f3cd4fb44818ac959acb
                                                • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                • Instruction Fuzzy Hash: 24D05E3090564CABCB20CEE5990499973A8D705324F208794E91983280D63199009750
                                                APIs
                                                • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 000C1CBC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: InfoParametersSystem
                                                • String ID:
                                                • API String ID: 3098949447-0
                                                • Opcode ID: b09a23bbbe24cd81e790c24804f3d509a3bf5a94f209aa1b9b9955293ddc6caa
                                                • Instruction ID: 6786e4fb22ba81df57cf4a6fd9f2fd0cfbc65183e2e0fd3c039f356b7d2295b6
                                                • Opcode Fuzzy Hash: b09a23bbbe24cd81e790c24804f3d509a3bf5a94f209aa1b9b9955293ddc6caa
                                                • Instruction Fuzzy Hash: 6EC0483A380306AEF2148B90AC4AF507764A348B11F448002F619A99E392B228A0EA90
                                                APIs
                                                • Sleep.KERNELBASE(000001F4), ref: 00BE7639
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755722286.0000000000BE5000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BE5000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_be5000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                • Instruction ID: fd08f9c987d3e39efb5159a3fcb227e67de217caef8bc4ee973a1a3eea417bb8
                                                • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                • Instruction Fuzzy Hash: 27E0BF7498414DEFDB00DFA8D5496DD7BB4EF04301F1005A1FD05D7680DB309E549A66
                                                APIs
                                                • Sleep.KERNELBASE(000001F4), ref: 00BE7639
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755722286.0000000000BE5000.00000040.00000020.00020000.00000000.sdmp, Offset: 00BE5000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_be5000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                • Instruction ID: 4feb442dff55fb81b91e4ab8be293d5c28922691da0379c46ee6c550f05f094c
                                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                • Instruction Fuzzy Hash: C5E0E67498414DDFDB00DFB8D54969D7FF4EF04301F1005A1FD01D2280DB309D509A62
                                                APIs
                                                  • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                                • NtdllDialogWndProc_W.NTDLL(?,0000004E,?,?,?,?,?,?), ref: 0015961A
                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0015965B
                                                • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0015969F
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001596C9
                                                • SendMessageW.USER32 ref: 001596F2
                                                • GetKeyState.USER32(00000011), ref: 0015978B
                                                • GetKeyState.USER32(00000009), ref: 00159798
                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 001597AE
                                                • GetKeyState.USER32(00000010), ref: 001597B8
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 001597E9
                                                • SendMessageW.USER32 ref: 00159810
                                                • SendMessageW.USER32(?,00001030,?,00157E95), ref: 00159918
                                                • SetCapture.USER32(?), ref: 0015994A
                                                • ClientToScreen.USER32(?,?), ref: 001599AF
                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001599D6
                                                • ReleaseCapture.USER32 ref: 001599E1
                                                • GetCursorPos.USER32(?), ref: 00159A19
                                                • ScreenToClient.USER32(?,?), ref: 00159A26
                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 00159A80
                                                • SendMessageW.USER32 ref: 00159AAE
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00159AEB
                                                • SendMessageW.USER32 ref: 00159B1A
                                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00159B3B
                                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00159B4A
                                                • GetCursorPos.USER32(?), ref: 00159B68
                                                • ScreenToClient.USER32(?,?), ref: 00159B75
                                                • GetParent.USER32(?), ref: 00159B93
                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 00159BFA
                                                • SendMessageW.USER32 ref: 00159C2B
                                                • ClientToScreen.USER32(?,?), ref: 00159C84
                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00159CB4
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00159CDE
                                                • SendMessageW.USER32 ref: 00159D01
                                                • ClientToScreen.USER32(?,?), ref: 00159D4E
                                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00159D82
                                                  • Part of subcall function 000D9944: GetWindowLongW.USER32(?,000000EB), ref: 000D9952
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00159E05
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$ClientScreen$LongWindow$State$CaptureCursorMenuPopupTrack$DialogInvalidateNtdllParentProc_RectRelease
                                                • String ID: @GUI_DRAGID$F
                                                • API String ID: 1312020300-4164748364
                                                • Opcode ID: e952c505bd22625409e87cce81605b05ec9437295c724cb29dfc4483b7980025
                                                • Instruction ID: 5d1c605c6e40d2b424feef0e14b729146206454f46baa6e0fa3d669961f9f85b
                                                • Opcode Fuzzy Hash: e952c505bd22625409e87cce81605b05ec9437295c724cb29dfc4483b7980025
                                                • Instruction Fuzzy Hash: 8A429C74204301EFDB25CF24CD44AAABBE5FF48315F10061EF9698B6A1D731A998DF92
                                                APIs
                                                • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 001548F3
                                                • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00154908
                                                • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00154927
                                                • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0015494B
                                                • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0015495C
                                                • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0015497B
                                                • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 001549AE
                                                • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 001549D4
                                                • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00154A0F
                                                • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00154A56
                                                • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00154A7E
                                                • IsMenu.USER32(?), ref: 00154A97
                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00154AF2
                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00154B20
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00154B94
                                                • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00154BE3
                                                • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00154C82
                                                • wsprintfW.USER32 ref: 00154CAE
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00154CC9
                                                • GetWindowTextW.USER32(?,00000000,00000001), ref: 00154CF1
                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00154D13
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00154D33
                                                • GetWindowTextW.USER32(?,00000000,00000001), ref: 00154D5A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                • String ID: %d/%02d/%02d
                                                • API String ID: 4054740463-328681919
                                                • Opcode ID: ff6588624eb12c6df381b666f24a097cef73267c397f953d75b03be9586bd911
                                                • Instruction ID: f6dbd103fef0e1047808425eb319563f75f11c78759474e50ea748510d39a147
                                                • Opcode Fuzzy Hash: ff6588624eb12c6df381b666f24a097cef73267c397f953d75b03be9586bd911
                                                • Instruction Fuzzy Hash: F712CF71600314EFEB258F68CC49FEE7BB8EB45719F10411AF926DE2A1DB749A84CB50
                                                APIs
                                                • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 000DF998
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0011F474
                                                • IsIconic.USER32(00000000), ref: 0011F47D
                                                • ShowWindow.USER32(00000000,00000009), ref: 0011F48A
                                                • SetForegroundWindow.USER32(00000000), ref: 0011F494
                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0011F4AA
                                                • GetCurrentThreadId.KERNEL32 ref: 0011F4B1
                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0011F4BD
                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0011F4CE
                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0011F4D6
                                                • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0011F4DE
                                                • SetForegroundWindow.USER32(00000000), ref: 0011F4E1
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0011F4F6
                                                • keybd_event.USER32(00000012,00000000), ref: 0011F501
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0011F50B
                                                • keybd_event.USER32(00000012,00000000), ref: 0011F510
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0011F519
                                                • keybd_event.USER32(00000012,00000000), ref: 0011F51E
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0011F528
                                                • keybd_event.USER32(00000012,00000000), ref: 0011F52D
                                                • SetForegroundWindow.USER32(00000000), ref: 0011F530
                                                • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0011F557
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 4125248594-2988720461
                                                • Opcode ID: fa67de7864ebb8172223bfe342b5ca3bb656711e73e407d3f3b4fb43e5ade5c5
                                                • Instruction ID: b6074ddf2ee5d394851224cb2c93f1173152f61514ba9bf3f6673b8149705daf
                                                • Opcode Fuzzy Hash: fa67de7864ebb8172223bfe342b5ca3bb656711e73e407d3f3b4fb43e5ade5c5
                                                • Instruction Fuzzy Hash: 6D318D71B40318BEEB246FB55C4AFBF7E6DEB44B51F100069FA00EA1D1D7B05981AAA0
                                                APIs
                                                  • Part of subcall function 001216C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0012170D
                                                  • Part of subcall function 001216C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0012173A
                                                  • Part of subcall function 001216C3: GetLastError.KERNEL32 ref: 0012174A
                                                • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00121286
                                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 001212A8
                                                • CloseHandle.KERNEL32(?), ref: 001212B9
                                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 001212D1
                                                • GetProcessWindowStation.USER32 ref: 001212EA
                                                • SetProcessWindowStation.USER32(00000000), ref: 001212F4
                                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00121310
                                                  • Part of subcall function 001210BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001211FC), ref: 001210D4
                                                  • Part of subcall function 001210BF: CloseHandle.KERNEL32(?,?,001211FC), ref: 001210E9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                • String ID: $default$winsta0$winsta0\default
                                                • API String ID: 22674027-1685893292
                                                • Opcode ID: e5b6dd5d5b58a16a34ba666ac145a2402c4af59c618c2efa02f2da4cfe31545c
                                                • Instruction ID: a5ec81c4a355613b55f8165e9c946ab9614473473f32ef94565e00f48ed500f4
                                                • Opcode Fuzzy Hash: e5b6dd5d5b58a16a34ba666ac145a2402c4af59c618c2efa02f2da4cfe31545c
                                                • Instruction Fuzzy Hash: C481AD71900359BFDF20EFA4EC49BEE7BB9EF14700F144129F915A62A0D7708AA4CB60
                                                APIs
                                                  • Part of subcall function 001210F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00121114
                                                  • Part of subcall function 001210F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 00121120
                                                  • Part of subcall function 001210F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 0012112F
                                                  • Part of subcall function 001210F9: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 00121136
                                                  • Part of subcall function 001210F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0012114D
                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00120BCC
                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00120C00
                                                • GetLengthSid.ADVAPI32(?), ref: 00120C17
                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00120C51
                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00120C6D
                                                • GetLengthSid.ADVAPI32(?), ref: 00120C84
                                                • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00120C8C
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00120C93
                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00120CB4
                                                • CopySid.ADVAPI32(00000000), ref: 00120CBB
                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00120CEA
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00120D0C
                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00120D1E
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00120D45
                                                • HeapFree.KERNEL32(00000000), ref: 00120D4C
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00120D55
                                                • HeapFree.KERNEL32(00000000), ref: 00120D5C
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00120D65
                                                • HeapFree.KERNEL32(00000000), ref: 00120D6C
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00120D78
                                                • HeapFree.KERNEL32(00000000), ref: 00120D7F
                                                  • Part of subcall function 00121193: GetProcessHeap.KERNEL32(00000008,00120BB1,?,00000000,?,00120BB1,?), ref: 001211A1
                                                  • Part of subcall function 00121193: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 001211A8
                                                  • Part of subcall function 00121193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00120BB1,?), ref: 001211B7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Security$Free$AllocateDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                • String ID:
                                                • API String ID: 4042927181-0
                                                • Opcode ID: e32eff31de3325c9b337da8195d85bfafbac9e399e12f8f8e9c326a62cce97ee
                                                • Instruction ID: 4c170a9acf8b738c55cc20a3bd803a9d51d08bcdd59c538f5d8ee7bb87b00b32
                                                • Opcode Fuzzy Hash: e32eff31de3325c9b337da8195d85bfafbac9e399e12f8f8e9c326a62cce97ee
                                                • Instruction Fuzzy Hash: ED716A7590131AEFDF11DFE4EC44BAEBBB8EF08311F044215F914AA292D771AA55CBA0
                                                APIs
                                                • OpenClipboard.USER32(0015CC08), ref: 0013EB29
                                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 0013EB37
                                                • GetClipboardData.USER32(0000000D), ref: 0013EB43
                                                • CloseClipboard.USER32 ref: 0013EB4F
                                                • GlobalLock.KERNEL32(00000000), ref: 0013EB87
                                                • CloseClipboard.USER32 ref: 0013EB91
                                                • GlobalUnlock.KERNEL32(00000000), ref: 0013EBBC
                                                • IsClipboardFormatAvailable.USER32(00000001), ref: 0013EBC9
                                                • GetClipboardData.USER32(00000001), ref: 0013EBD1
                                                • GlobalLock.KERNEL32(00000000), ref: 0013EBE2
                                                • GlobalUnlock.KERNEL32(00000000), ref: 0013EC22
                                                • IsClipboardFormatAvailable.USER32(0000000F), ref: 0013EC38
                                                • GetClipboardData.USER32(0000000F), ref: 0013EC44
                                                • GlobalLock.KERNEL32(00000000), ref: 0013EC55
                                                • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0013EC77
                                                • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0013EC94
                                                • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0013ECD2
                                                • GlobalUnlock.KERNEL32(00000000), ref: 0013ECF3
                                                • CountClipboardFormats.USER32 ref: 0013ED14
                                                • CloseClipboard.USER32 ref: 0013ED59
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                • String ID:
                                                • API String ID: 420908878-0
                                                • Opcode ID: 8c3ba023c0f42371a27b057261cfa6f3578e18d811f6351b3f5e4e7e8f933977
                                                • Instruction ID: 64c18a18df515a6f6d969ca9bba311ca4801362ac9f3bb187aacb7dff6a02174
                                                • Opcode Fuzzy Hash: 8c3ba023c0f42371a27b057261cfa6f3578e18d811f6351b3f5e4e7e8f933977
                                                • Instruction Fuzzy Hash: EB61AB34204301AFD310EF64D899F6AB7E4EF84714F14455DF4569B2E2CB71EA85CBA2
                                                APIs
                                                  • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                                • DragQueryPoint.SHELL32(?,?), ref: 00159147
                                                  • Part of subcall function 00157674: ClientToScreen.USER32(?,?), ref: 0015769A
                                                  • Part of subcall function 00157674: GetWindowRect.USER32(?,?), ref: 00157710
                                                  • Part of subcall function 00157674: PtInRect.USER32(?,?,00158B89), ref: 00157720
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 001591B0
                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 001591BB
                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 001591DE
                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00159225
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0015923E
                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00159255
                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00159277
                                                • DragFinish.SHELL32(?), ref: 0015927E
                                                • NtdllDialogWndProc_W.NTDLL(?,00000233,?,00000000,?,?,?), ref: 00159371
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientDialogFinishLongNtdllPointProc_Screen
                                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                • API String ID: 4085959399-3440237614
                                                • Opcode ID: 078cf8b7e48262ff321ece034b428be1f9f86e958bb145b396c38ba37c21c808
                                                • Instruction ID: 8f56bcae9c06a40d9ba44279aef907fe2b3af17fbbcf772b7234567bf0220311
                                                • Opcode Fuzzy Hash: 078cf8b7e48262ff321ece034b428be1f9f86e958bb145b396c38ba37c21c808
                                                • Instruction Fuzzy Hash: 7D616B71108301EFD701EF64DC85EAFBBE8EF89750F00092EF5A5961A1DB709A49CB92
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 001369BE
                                                • FindClose.KERNEL32(00000000), ref: 00136A12
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00136A4E
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00136A75
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00136AB2
                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00136ADF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                • API String ID: 3830820486-3289030164
                                                • Opcode ID: e3639dc052709c74d54c9613c25ece9f9bc040e327591c5eb2902c8287f873e1
                                                • Instruction ID: ae95291748b613a023416962041e84ca580752b6d6bfca8e34f67b561b9f8e14
                                                • Opcode Fuzzy Hash: e3639dc052709c74d54c9613c25ece9f9bc040e327591c5eb2902c8287f873e1
                                                • Instruction Fuzzy Hash: 43D14171508340AFC714EBA4C886EAFB7ECAF88704F44491DF589D7192EB74DA49CB62
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00139663
                                                • GetFileAttributesW.KERNEL32(?), ref: 001396A1
                                                • SetFileAttributesW.KERNEL32(?,?), ref: 001396BB
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 001396D3
                                                • FindClose.KERNEL32(00000000), ref: 001396DE
                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 001396FA
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0013974A
                                                • SetCurrentDirectoryW.KERNEL32(00186B7C), ref: 00139768
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00139772
                                                • FindClose.KERNEL32(00000000), ref: 0013977F
                                                • FindClose.KERNEL32(00000000), ref: 0013978F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                • String ID: *.*
                                                • API String ID: 1409584000-438819550
                                                • Opcode ID: 22cac37931d8a3bd398360795bb55ed5066e73643b7fbc3c96c03bd8f0185c52
                                                • Instruction ID: ca328e2ce59952a3fe0ba1af424e2579a1362189401a65fd945e64ebeb9ef132
                                                • Opcode Fuzzy Hash: 22cac37931d8a3bd398360795bb55ed5066e73643b7fbc3c96c03bd8f0185c52
                                                • Instruction Fuzzy Hash: 1631F13264131AAFDF14AFB4DC49ADE77ACAF09322F144055F915E60E0EBB4DE848E90
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 001397BE
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00139819
                                                • FindClose.KERNEL32(00000000), ref: 00139824
                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00139840
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00139890
                                                • SetCurrentDirectoryW.KERNEL32(00186B7C), ref: 001398AE
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 001398B8
                                                • FindClose.KERNEL32(00000000), ref: 001398C5
                                                • FindClose.KERNEL32(00000000), ref: 001398D5
                                                  • Part of subcall function 0012DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0012DB00
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                • String ID: *.*
                                                • API String ID: 2640511053-438819550
                                                • Opcode ID: 5eb7a3c5a5a6d2922a9190e7b573a9ce56da2599c7278b2dcfbfce378315a26a
                                                • Instruction ID: c4c14ed6f4700d1a6af0bbb87d468a715dab0e2e164c30e89f66f9bf9a11c78f
                                                • Opcode Fuzzy Hash: 5eb7a3c5a5a6d2922a9190e7b573a9ce56da2599c7278b2dcfbfce378315a26a
                                                • Instruction Fuzzy Hash: 2D31D23250035EAEDF10EFB4EC48ADE77ACAF46325F1441A5E950A60A1DBB4DE84CF60
                                                APIs
                                                  • Part of subcall function 0014C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0014B6AE,?,?), ref: 0014C9B5
                                                  • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014C9F1
                                                  • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA68
                                                  • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA9E
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0014BF3E
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0014BFA9
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0014BFCD
                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0014C02C
                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0014C0E7
                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0014C154
                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0014C1E9
                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0014C23A
                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0014C2E3
                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0014C382
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0014C38F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                • String ID:
                                                • API String ID: 3102970594-0
                                                • Opcode ID: 94abd5fe760f0fa32bccb4a530cc491d00ccd5ab25549c727cb8f576fe7bb7f1
                                                • Instruction ID: cd0f45c9572e17e7d7f7db2bce3539f81c6be2cbd2c99906dd394873f8886232
                                                • Opcode Fuzzy Hash: 94abd5fe760f0fa32bccb4a530cc491d00ccd5ab25549c727cb8f576fe7bb7f1
                                                • Instruction Fuzzy Hash: 2B023C716042009FD754DF28C895E2ABBE5EF89318F18C49DF84ACB2A2DB31ED45CB91
                                                APIs
                                                • GetLocalTime.KERNEL32(?), ref: 00138257
                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00138267
                                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00138273
                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00138310
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00138324
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00138356
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0013838C
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00138395
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CurrentDirectoryTime$File$Local$System
                                                • String ID: *.*
                                                • API String ID: 1464919966-438819550
                                                • Opcode ID: 0227471207b35da640898383196047b24832fd22777622af880b10d4c5b4da6c
                                                • Instruction ID: 85d21375b86c2f073419f34e2cc51610a4901858191ae54d321f1c4cf9de86ca
                                                • Opcode Fuzzy Hash: 0227471207b35da640898383196047b24832fd22777622af880b10d4c5b4da6c
                                                • Instruction Fuzzy Hash: 226169725043459FCB10EF60C841EAEB3E8FF89314F04892EF98997252DB35E949CB92
                                                APIs
                                                  • Part of subcall function 000C3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,000C3A97,?,?,000C2E7F,?,?,?,00000000), ref: 000C3AC2
                                                  • Part of subcall function 0012E199: GetFileAttributesW.KERNEL32(?,0012CF95), ref: 0012E19A
                                                • FindFirstFileW.KERNEL32(?,?), ref: 0012D122
                                                • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0012D1DD
                                                • MoveFileW.KERNEL32(?,?), ref: 0012D1F0
                                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 0012D20D
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0012D237
                                                  • Part of subcall function 0012D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0012D21C,?,?), ref: 0012D2B2
                                                • FindClose.KERNEL32(00000000,?,?,?), ref: 0012D253
                                                • FindClose.KERNEL32(00000000), ref: 0012D264
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                • String ID: \*.*
                                                • API String ID: 1946585618-1173974218
                                                • Opcode ID: 51e93801966d11672305dd84d5ecabb6494d94889eeca28a5070c7e8707d438b
                                                • Instruction ID: 6f7c3366f8023294738cedc79e3bf108b9ddda3f654fbfb08451f2ee71fd5cbf
                                                • Opcode Fuzzy Hash: 51e93801966d11672305dd84d5ecabb6494d94889eeca28a5070c7e8707d438b
                                                • Instruction Fuzzy Hash: 6E615C3190125D9FCF05EBA0EA92EEDB7B5AF15300F608169E40277192EB30AF19CB61
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                • String ID:
                                                • API String ID: 1737998785-0
                                                • Opcode ID: 5ce4e1e0c0381c005689909ee4497b58d7df05a4acc250afbf85b31538a0779a
                                                • Instruction ID: 45ddf7d4db2b3db4d5dd696e289fb0e351c12449a1f439e0f4ed8fc0e9369192
                                                • Opcode Fuzzy Hash: 5ce4e1e0c0381c005689909ee4497b58d7df05a4acc250afbf85b31538a0779a
                                                • Instruction Fuzzy Hash: 5A416A35604711EFE710DF15D888F5ABBE5EF44329F1480A9E4198FAA2C735ED82CB90
                                                APIs
                                                  • Part of subcall function 001216C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0012170D
                                                  • Part of subcall function 001216C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0012173A
                                                  • Part of subcall function 001216C3: GetLastError.KERNEL32 ref: 0012174A
                                                • ExitWindowsEx.USER32(?,00000000), ref: 0012E932
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                • String ID: $ $@$SeShutdownPrivilege
                                                • API String ID: 2234035333-3163812486
                                                • Opcode ID: 83d9d6c01d07755ec08e1bc4ca280104463bb34e2baf8417bb0ac3c54b601a94
                                                • Instruction ID: a89eb6d170ddfca038460e8f77f5ec637d4abc1daa477d6aa957b370952dc7ff
                                                • Opcode Fuzzy Hash: 83d9d6c01d07755ec08e1bc4ca280104463bb34e2baf8417bb0ac3c54b601a94
                                                • Instruction Fuzzy Hash: 9801D672A10331AFEF5466B8BC8ABBF729CA724759F150423F902E61D1E7A05CE4C6D4
                                                APIs
                                                • socket.WS2_32(00000002,00000001,00000006), ref: 00141276
                                                • WSAGetLastError.WS2_32 ref: 00141283
                                                • bind.WS2_32(00000000,?,00000010), ref: 001412BA
                                                • WSAGetLastError.WS2_32 ref: 001412C5
                                                • closesocket.WS2_32(00000000), ref: 001412F4
                                                • listen.WS2_32(00000000,00000005), ref: 00141303
                                                • WSAGetLastError.WS2_32 ref: 0014130D
                                                • closesocket.WS2_32(00000000), ref: 0014133C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorLast$closesocket$bindlistensocket
                                                • String ID:
                                                • API String ID: 540024437-0
                                                • Opcode ID: f9679bd45e53834dda22d521b08eb8560b06dccd83a2d7f98d718ebed6c76f1f
                                                • Instruction ID: 328f79ed3a120bed43919b1aed8ea51e3b189a4dcc9f1ed55a3d42eb6d1d934c
                                                • Opcode Fuzzy Hash: f9679bd45e53834dda22d521b08eb8560b06dccd83a2d7f98d718ebed6c76f1f
                                                • Instruction Fuzzy Hash: 9D414E31600200AFD714DF64C485F69BBE6BF46318F288198E8569F2A6C771EDC2CBE1
                                                APIs
                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 001282AA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: lstrlen
                                                • String ID: ($AddRef$InterfaceDispatch$QueryInterface$Release$|
                                                • API String ID: 1659193697-2318614619
                                                • Opcode ID: 33d203fba6ed5718d4a4644130a92062c1e739db583ce0dc3777b78ff891ef3c
                                                • Instruction ID: de142dacf061b0bcea1a70d23d5400b6179f202124812df7364798c8645f5f2e
                                                • Opcode Fuzzy Hash: 33d203fba6ed5718d4a4644130a92062c1e739db583ce0dc3777b78ff891ef3c
                                                • Instruction Fuzzy Hash: 78323474A007159FCB28CF19D481AAAB7F0FF48710B15C46EE49ADB3A1EB70E991CB50
                                                APIs
                                                  • Part of subcall function 000C3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,000C3A97,?,?,000C2E7F,?,?,?,00000000), ref: 000C3AC2
                                                  • Part of subcall function 0012E199: GetFileAttributesW.KERNEL32(?,0012CF95), ref: 0012E19A
                                                • FindFirstFileW.KERNEL32(?,?), ref: 0012D420
                                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 0012D470
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0012D481
                                                • FindClose.KERNEL32(00000000), ref: 0012D498
                                                • FindClose.KERNEL32(00000000), ref: 0012D4A1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                • String ID: \*.*
                                                • API String ID: 2649000838-1173974218
                                                • Opcode ID: eab70205fa86c4af982cd8ac11435cdae5922b17e51e0314b32b093cf02392b1
                                                • Instruction ID: ca41c5c4da0b3f02345ba387cd78b02c9f1eee507c027a6e337c0c728e175678
                                                • Opcode Fuzzy Hash: eab70205fa86c4af982cd8ac11435cdae5922b17e51e0314b32b093cf02392b1
                                                • Instruction Fuzzy Hash: 41316F310083959FC204EF64E855DEF77A8AF96314F444A1DF4D153192EB30AA19CB63
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: __floor_pentium4
                                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                • API String ID: 4168288129-2761157908
                                                • Opcode ID: 34d9f2d45f9533c6b358f12e7917ce322b9070a1e395aa0335b0c3b43628a890
                                                • Instruction ID: facc1f046acf5843595898a69fe43feaab5f4c898d87d0ecd95efaec6ec0be1b
                                                • Opcode Fuzzy Hash: 34d9f2d45f9533c6b358f12e7917ce322b9070a1e395aa0335b0c3b43628a890
                                                • Instruction Fuzzy Hash: A4C25872E086298FDB64CE28DD407FAB7B5EB44304F1441EADA0DE7651E778AE819F40
                                                APIs
                                                • _wcslen.LIBCMT ref: 001364DC
                                                • CoInitialize.OLE32(00000000), ref: 00136639
                                                • CoCreateInstance.COMBASE(0015FCF8,00000000,00000001,0015FB68,?), ref: 00136650
                                                • CoUninitialize.COMBASE ref: 001368D4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                • String ID: .lnk
                                                • API String ID: 886957087-24824748
                                                • Opcode ID: d6b0996d9206fc375cdee839d500a71eb8b814238760d8010bbc8952bb88a228
                                                • Instruction ID: ce5be1620e316509957a47a630d095e63d83f84d983e290b7717e0c6659eb2b3
                                                • Opcode Fuzzy Hash: d6b0996d9206fc375cdee839d500a71eb8b814238760d8010bbc8952bb88a228
                                                • Instruction Fuzzy Hash: 2BD12A71508301AFD314EF24C881EABB7E8EF99704F50896DF5558B292DB71E906CB92
                                                APIs
                                                • GetForegroundWindow.USER32(?,?,00000000), ref: 001422E8
                                                  • Part of subcall function 0013E4EC: GetWindowRect.USER32(?,?), ref: 0013E504
                                                • GetDesktopWindow.USER32 ref: 00142312
                                                • GetWindowRect.USER32(00000000), ref: 00142319
                                                • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00142355
                                                • GetCursorPos.USER32(?), ref: 00142381
                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 001423DF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                • String ID:
                                                • API String ID: 2387181109-0
                                                • Opcode ID: 8bcbea19aaf3aa5cd6231f3c552353996514b9c512a5bc241ea563266d5c2cf2
                                                • Instruction ID: 34249d109f7c249f7585bf60807f20b4b3efabb2c542f6a6f981bb03cbf00d97
                                                • Opcode Fuzzy Hash: 8bcbea19aaf3aa5cd6231f3c552353996514b9c512a5bc241ea563266d5c2cf2
                                                • Instruction Fuzzy Hash: B131DE72504315AFCB20DF54D849B9BBBE9FF88314F400A19F9859B191DB74EA88CBD2
                                                APIs
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00139B78
                                                • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00139C8B
                                                  • Part of subcall function 00133874: GetInputState.USER32 ref: 001338CB
                                                  • Part of subcall function 00133874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00133966
                                                • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00139BA8
                                                • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00139C75
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                • String ID: *.*
                                                • API String ID: 1972594611-438819550
                                                • Opcode ID: 31f5ca7a8258982ab6b8af381bd1cf3a964912dd2c84318730d2fe3734d4770f
                                                • Instruction ID: 84e00c77be1a4f644101be8d447ee1ff954f64f310b71f49594754ac97c27627
                                                • Opcode Fuzzy Hash: 31f5ca7a8258982ab6b8af381bd1cf3a964912dd2c84318730d2fe3734d4770f
                                                • Instruction Fuzzy Hash: 1F41407190420A9FDF15DFA4C989EEEBBB8EF05311F244159E815A7191EB709E84CFA0
                                                APIs
                                                  • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                                • NtdllDialogWndProc_W.NTDLL(?,?,?,?,?), ref: 000D9A4E
                                                • GetSysColor.USER32(0000000F), ref: 000D9B23
                                                • SetBkColor.GDI32(?,00000000), ref: 000D9B36
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Color$DialogLongNtdllProc_Window
                                                • String ID:
                                                • API String ID: 1958858920-0
                                                • Opcode ID: 48c011ad5ecc2b97f36ea975d01babe8c9866c361953640fca2d578ea7dfac06
                                                • Instruction ID: c3ab8990297ea0961d8dc42fe186d89394f93761fe7e66a009944c2a2610ac99
                                                • Opcode Fuzzy Hash: 48c011ad5ecc2b97f36ea975d01babe8c9866c361953640fca2d578ea7dfac06
                                                • Instruction Fuzzy Hash: E9A1F771208604FEE739AA2C8C59DBF36ADDB42350F15021BF512DABD1DB259D81D2B3
                                                APIs
                                                  • Part of subcall function 0014304E: inet_addr.WS2_32(?), ref: 0014307A
                                                  • Part of subcall function 0014304E: _wcslen.LIBCMT ref: 0014309B
                                                • socket.WS2_32(00000002,00000002,00000011), ref: 0014185D
                                                • WSAGetLastError.WS2_32 ref: 00141884
                                                • bind.WS2_32(00000000,?,00000010), ref: 001418DB
                                                • WSAGetLastError.WS2_32 ref: 001418E6
                                                • closesocket.WS2_32(00000000), ref: 00141915
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                • String ID:
                                                • API String ID: 1601658205-0
                                                • Opcode ID: 491d9c86a2d6e8d2d4530bac21b3b5c31f1591f8a5136992f6971d62ce9714a9
                                                • Instruction ID: d743a702904d5f1eac80f92ddf855cca5d642b8fb4d5128690956551c9e690f7
                                                • Opcode Fuzzy Hash: 491d9c86a2d6e8d2d4530bac21b3b5c31f1591f8a5136992f6971d62ce9714a9
                                                • Instruction Fuzzy Hash: DB518275A00210AFEB10AF24C886F6E77E5AF44718F58845CF91A5F3D3D771AD828BA1
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                • String ID:
                                                • API String ID: 292994002-0
                                                • Opcode ID: 13a66b7beb6374fab52516edf751ddb28216864d788645bef08e4b7307368efe
                                                • Instruction ID: 7eaf7446c71c640527b3a4b6254985b7820eff138de8e003c54c855acc3a8c2c
                                                • Opcode Fuzzy Hash: 13a66b7beb6374fab52516edf751ddb28216864d788645bef08e4b7307368efe
                                                • Instruction Fuzzy Hash: 59219131740211EFD7228F1AC884F6A7BA5AF95326B59806CEC5A8F351D772EC46CB90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                • API String ID: 0-1546025612
                                                • Opcode ID: 0ac5fca57935855bef588b8e1e422e2c109edec0d239854d71dd5114d4a01200
                                                • Instruction ID: bcb9f5da3d53189d31ad1bfc75a8ed28ccc248fb836e8312290ebb979463bdca
                                                • Opcode Fuzzy Hash: 0ac5fca57935855bef588b8e1e422e2c109edec0d239854d71dd5114d4a01200
                                                • Instruction Fuzzy Hash: E6A28470E0061ACBDF34CF58C944BAEB7B2BF54310F2481AAE855A7285EBB49D91CF54
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 0014A6AC
                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0014A6BA
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                • Process32NextW.KERNEL32(00000000,?), ref: 0014A79C
                                                • CloseHandle.KERNEL32(00000000), ref: 0014A7AB
                                                  • Part of subcall function 000DCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00103303,?), ref: 000DCE8A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                • String ID:
                                                • API String ID: 1991900642-0
                                                • Opcode ID: b8e05f29fb15c69b446e410cf257442d784840ad87bdf86fb7c3afec91dda3d3
                                                • Instruction ID: e16b1ae372f47376193db9afcd8ea7ffa8e1e89b6d6fe7ad8de9fb20bd11fbfc
                                                • Opcode Fuzzy Hash: b8e05f29fb15c69b446e410cf257442d784840ad87bdf86fb7c3afec91dda3d3
                                                • Instruction Fuzzy Hash: 895108715083019FD710DF24C886EAEBBE8FF89754F40491DF59A972A2EB31D905CBA2
                                                APIs
                                                • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0012AAAC
                                                • SetKeyboardState.USER32(00000080), ref: 0012AAC8
                                                • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0012AB36
                                                • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0012AB88
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: KeyboardState$InputMessagePostSend
                                                • String ID:
                                                • API String ID: 432972143-0
                                                • Opcode ID: 0db559f4b03878ec7e1a2c6d28bd689e3a5a77039898dc7a9b1ca5d4e7bf34da
                                                • Instruction ID: 54da06744b220e1ca42f67a3b4830adb48a13c7bbdabfeab80d90d2aa51dc230
                                                • Opcode Fuzzy Hash: 0db559f4b03878ec7e1a2c6d28bd689e3a5a77039898dc7a9b1ca5d4e7bf34da
                                                • Instruction Fuzzy Hash: C6314B30A40328AFFF35CB68EC05BFE7BA6AF54310F84421AF581961D0D37599A5C7A2
                                                APIs
                                                • _free.LIBCMT ref: 000FBB7F
                                                  • Part of subcall function 000F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000), ref: 000F29DE
                                                  • Part of subcall function 000F29C8: GetLastError.KERNEL32(00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000,00000000), ref: 000F29F0
                                                • GetTimeZoneInformation.KERNEL32 ref: 000FBB91
                                                • WideCharToMultiByte.KERNEL32(00000000,?,0019121C,000000FF,?,0000003F,?,?), ref: 000FBC09
                                                • WideCharToMultiByte.KERNEL32(00000000,?,00191270,000000FF,?,0000003F,?,?,?,0019121C,000000FF,?,0000003F,?,?), ref: 000FBC36
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                • String ID:
                                                • API String ID: 806657224-0
                                                • Opcode ID: 90aa526f38ae39ac14c3b668bccdb05885322536b6ca227edbc99cd758e670d4
                                                • Instruction ID: b52ce7266dbe96fa00a77154ddad002a8e3adff342dc029dea6753d5e5afef01
                                                • Opcode Fuzzy Hash: 90aa526f38ae39ac14c3b668bccdb05885322536b6ca227edbc99cd758e670d4
                                                • Instruction Fuzzy Hash: 5131A27090420AEFCB11EF69DC8047EBBF8BF45750724429AE150DBAA1D7709A80EF90
                                                APIs
                                                  • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                                • GetCursorPos.USER32(?), ref: 00159001
                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00117711,?,?,?,?,?), ref: 00159016
                                                • GetCursorPos.USER32(?), ref: 0015905E
                                                • NtdllDialogWndProc_W.NTDLL(?,0000007B,?,?,?,?,?,?,?,?,?,?,00117711,?,?,?), ref: 00159094
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Cursor$DialogLongMenuNtdllPopupProc_TrackWindow
                                                • String ID:
                                                • API String ID: 1423138444-0
                                                • Opcode ID: 154f570a801746f7022aeb44770450b0f631019da8c63c48abe7b944f6167111
                                                • Instruction ID: cf22a47d30bdf5b855917b3c525a431db38ae4eff93a76b6030cb80bf5059dec
                                                • Opcode Fuzzy Hash: 154f570a801746f7022aeb44770450b0f631019da8c63c48abe7b944f6167111
                                                • Instruction Fuzzy Hash: 86219F35600118FFCB258F94CC58EEB7BB9EB49352F044555F9154F2A1D3319990EBA1
                                                APIs
                                                • InternetReadFile.WININET(?,?,00000400,?), ref: 0013CE89
                                                • GetLastError.KERNEL32(?,00000000), ref: 0013CEEA
                                                • SetEvent.KERNEL32(?,?,00000000), ref: 0013CEFE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorEventFileInternetLastRead
                                                • String ID:
                                                • API String ID: 234945975-0
                                                • Opcode ID: bbc772686462004a84a4fcca903c857c03f7f69c5bec48bd7ffd1422f7e9ec06
                                                • Instruction ID: c6be232bac8370517148c79276cf7bdb498aca5f1b8d4203b6c2f6c7288562ea
                                                • Opcode Fuzzy Hash: bbc772686462004a84a4fcca903c857c03f7f69c5bec48bd7ffd1422f7e9ec06
                                                • Instruction Fuzzy Hash: 6A21BAB1500705EFEB20DFA5C948BAABBFCEB40358F10442EE646A6151E770EE448BA0
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00135CC1
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00135D17
                                                • FindClose.KERNEL32(?), ref: 00135D5F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Find$File$CloseFirstNext
                                                • String ID:
                                                • API String ID: 3541575487-0
                                                • Opcode ID: 5ab90fd189ef964972b0bf39a30d8b5f3d414be77f9a72bf1417a8e9244de93c
                                                • Instruction ID: d6588f328656fa5a9ff5216632ccc0ed825dc2bc19ce010cfd1c18eca090a039
                                                • Opcode Fuzzy Hash: 5ab90fd189ef964972b0bf39a30d8b5f3d414be77f9a72bf1417a8e9244de93c
                                                • Instruction Fuzzy Hash: 19518874604B019FC718CF68C494E9AB7E5FF49324F14855EE99A8B3A2CB30ED45CB91
                                                APIs
                                                • IsDebuggerPresent.KERNEL32 ref: 000F271A
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 000F2724
                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 000F2731
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                • String ID:
                                                • API String ID: 3906539128-0
                                                • Opcode ID: 2ed8c6f8099ee39833d07d86007028c6d7428354f2c686701a00e6e74d1fa1a6
                                                • Instruction ID: 503d0e49cdbd4f5d9859389cdbedd17b651b57b5171377a6f43db7bef4a3651d
                                                • Opcode Fuzzy Hash: 2ed8c6f8099ee39833d07d86007028c6d7428354f2c686701a00e6e74d1fa1a6
                                                • Instruction Fuzzy Hash: 2F31B47491131CDBCB61EF65DC897D9B7B8AF18310F5041EAE41CA6261E7709F818F45
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 001351DA
                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00135238
                                                • SetErrorMode.KERNEL32(00000000), ref: 001352A1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DiskFreeSpace
                                                • String ID:
                                                • API String ID: 1682464887-0
                                                • Opcode ID: f431f0b672b50d54a61cd643490acfcdb6c9bf345541bd30f7ff82880df4b6f6
                                                • Instruction ID: da583d01b93b81c1d22b092f28e4ab961b2920ed3efca2804f5f2d6a22019db5
                                                • Opcode Fuzzy Hash: f431f0b672b50d54a61cd643490acfcdb6c9bf345541bd30f7ff82880df4b6f6
                                                • Instruction Fuzzy Hash: B6312F75A00618DFDB00DF54D884FAEBBB5FF49314F448099E8099B352DB71E856CB90
                                                APIs
                                                  • Part of subcall function 000DFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 000E0668
                                                  • Part of subcall function 000DFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 000E0685
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0012170D
                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0012173A
                                                • GetLastError.KERNEL32 ref: 0012174A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                • String ID:
                                                • API String ID: 577356006-0
                                                • Opcode ID: 52ba3a08c991e767019e25994730ab2c6d764abcb9f1367d7babd09cc3bc4253
                                                • Instruction ID: dd6456e5fb9edd36784c2567934c126a314c7690a2b819000fe6adbe30d57025
                                                • Opcode Fuzzy Hash: 52ba3a08c991e767019e25994730ab2c6d764abcb9f1367d7babd09cc3bc4253
                                                • Instruction Fuzzy Hash: 4F1191B2404305BFD718DF54EC86DABB7BAEB44725B20852EF05657641EB70BC51CA60
                                                APIs
                                                • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0012D608
                                                • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0012D645
                                                • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0012D650
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CloseControlCreateDeviceFileHandle
                                                • String ID:
                                                • API String ID: 33631002-0
                                                • Opcode ID: dc30ee7cee2f6e1cc73734792fcc4bf832d1de54d8b1fc552a12676bb6fb3753
                                                • Instruction ID: 175c35e730bdfe0af6229cc78e2c436d0b275f9c6f266c8003388e706aa71db5
                                                • Opcode Fuzzy Hash: dc30ee7cee2f6e1cc73734792fcc4bf832d1de54d8b1fc552a12676bb6fb3753
                                                • Instruction Fuzzy Hash: D4112A75A05328BFDB108F95EC45BAFBBBCEB45B50F108115F914A7290D6704A058BE1
                                                APIs
                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0012168C
                                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 001216A1
                                                • FreeSid.ADVAPI32(?), ref: 001216B1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                • String ID:
                                                • API String ID: 3429775523-0
                                                • Opcode ID: 76124bd3b3aa1ffe34d436ba771debc7ec2139a71cf29ea34f3be660b1919f2e
                                                • Instruction ID: 9755391efd243871cd512cf0776f58ce490adcc57a80c436b7057bc31fb146d8
                                                • Opcode Fuzzy Hash: 76124bd3b3aa1ffe34d436ba771debc7ec2139a71cf29ea34f3be660b1919f2e
                                                • Instruction Fuzzy Hash: F1F0F475950309FFDB00DFE49C89AAEBBBCFB08605F504565E501E6181E774AA848A90
                                                APIs
                                                • GetCurrentProcess.KERNEL32(000F28E9,?,000E4CBE,000F28E9,001888B8,0000000C,000E4E15,000F28E9,00000002,00000000,?,000F28E9), ref: 000E4D09
                                                • TerminateProcess.KERNEL32(00000000,?,000E4CBE,000F28E9,001888B8,0000000C,000E4E15,000F28E9,00000002,00000000,?,000F28E9), ref: 000E4D10
                                                • ExitProcess.KERNEL32 ref: 000E4D22
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Process$CurrentExitTerminate
                                                • String ID:
                                                • API String ID: 1703294689-0
                                                • Opcode ID: 66f8686cbf4736b9a9c41be0c083c6917ea6fb9b471e8d7654a85c7517337271
                                                • Instruction ID: 7de24a0c3dc984b89390039695ef4fcf811715bcdd8066b4b8912559b1620468
                                                • Opcode Fuzzy Hash: 66f8686cbf4736b9a9c41be0c083c6917ea6fb9b471e8d7654a85c7517337271
                                                • Instruction Fuzzy Hash: B2E0B631005788EFCF51AF55DD09A983F69FF81792B108054FD05DA623CB35DD82DA80
                                                APIs
                                                • GetUserNameW.ADVAPI32(?,?), ref: 0011D28C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: NameUser
                                                • String ID: X64
                                                • API String ID: 2645101109-893830106
                                                • Opcode ID: b3f74d578713cff5cf66f419bd28fa7afd30c0439f0c257ef254a4031173e3f2
                                                • Instruction ID: 10607fe7b41f377026fca243f8ce891669d7aba2b04a70328e63fd852b3f4a07
                                                • Opcode Fuzzy Hash: b3f74d578713cff5cf66f419bd28fa7afd30c0439f0c257ef254a4031173e3f2
                                                • Instruction Fuzzy Hash: AFD0C9B480121DEECF94CB90EC88DDDB7BCBB04305F100152F106A2140D77495888F20
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                • Instruction ID: d18c819ce543c4553193f1225d589858fb06fe27032c3b3b226e889b80d46367
                                                • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                • Instruction Fuzzy Hash: 48020D71E012599FEF14CFA9C880AADFBF1EF48314F25416AD919F7384D731A9428B94
                                                APIs
                                                  • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                                  • Part of subcall function 000D9944: GetWindowLongW.USER32(?,000000EB), ref: 000D9952
                                                • GetParent.USER32(?), ref: 001173A3
                                                • NtdllDialogWndProc_W.NTDLL(?,00000133,?,?,?,?), ref: 0011742D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: LongWindow$DialogNtdllParentProc_
                                                • String ID:
                                                • API String ID: 314495775-0
                                                • Opcode ID: 96cbfb0f31c73e947292ad9f2e3efa4ba3af7499425afa2bf6889cf39f8ab991
                                                • Instruction ID: 487850fd49fbad327cf6b24c655d2cb0436644851d9b7d05ed36468fe167e419
                                                • Opcode Fuzzy Hash: 96cbfb0f31c73e947292ad9f2e3efa4ba3af7499425afa2bf6889cf39f8ab991
                                                • Instruction Fuzzy Hash: 3221BF30604204AFCB299F28CC59DE93BE5EF0A370F040266F9264B7E2C7309D91EA60
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00136918
                                                • FindClose.KERNEL32(00000000), ref: 00136961
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Find$CloseFileFirst
                                                • String ID:
                                                • API String ID: 2295610775-0
                                                • Opcode ID: fd4d00c8339d3d0e4042de8339e9f728785c9dbcc44cd741728abd310edd19c0
                                                • Instruction ID: 703e1f863f072150b11493b37a1c503e39af75cc562169807cc7e8405bd257ce
                                                • Opcode Fuzzy Hash: fd4d00c8339d3d0e4042de8339e9f728785c9dbcc44cd741728abd310edd19c0
                                                • Instruction Fuzzy Hash: 02117C31604600AFD710DF29D484F1ABBE5EF85329F15C6ADE4699F6A2C730EC46CB91
                                                APIs
                                                  • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                                • NtdllDialogWndProc_W.NTDLL(?,0000002B,?,?,?,?,?,?,?,0011769C,?,?,?), ref: 00159111
                                                  • Part of subcall function 000D9944: GetWindowLongW.USER32(?,000000EB), ref: 000D9952
                                                • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 001590F7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: LongWindow$DialogMessageNtdllProc_Send
                                                • String ID:
                                                • API String ID: 1273190321-0
                                                • Opcode ID: 478128bd247f11fdcaf57522b6ea3075e84d8b4336c007102832590237d1f723
                                                • Instruction ID: d4185811e3ad8856f4d14e24213059989fcacdf8cd47dfc842dfa615354606f1
                                                • Opcode Fuzzy Hash: 478128bd247f11fdcaf57522b6ea3075e84d8b4336c007102832590237d1f723
                                                • Instruction Fuzzy Hash: 8601BC30200315FBDB219F14DC89FA63BA6FB86376F140429FD611E6E1CB726885DB61
                                                APIs
                                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00144891,?,?,00000035,?), ref: 001337E4
                                                • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00144891,?,?,00000035,?), ref: 001337F4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorFormatLastMessage
                                                • String ID:
                                                • API String ID: 3479602957-0
                                                • Opcode ID: 69ccb1a7daa97922d89db1ea53b22e383d8e830240b9da6f4e6c85b54fb4e6f2
                                                • Instruction ID: bdd302aa19936d476591579ccafcd3cbe5b466602637b4926f352a6ce12977cd
                                                • Opcode Fuzzy Hash: 69ccb1a7daa97922d89db1ea53b22e383d8e830240b9da6f4e6c85b54fb4e6f2
                                                • Instruction Fuzzy Hash: 13F0E5B06043296AE72017668C4DFEB3AAEEFC4761F000165F519D2691DA609944C7F0
                                                APIs
                                                • ClientToScreen.USER32(?,?), ref: 00159423
                                                • NtdllDialogWndProc_W.NTDLL(?,00000200,?,00000000,?,?,00000000,00000000,?,0011776C,?,?,?,?,?), ref: 0015944C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ClientDialogNtdllProc_Screen
                                                • String ID:
                                                • API String ID: 3420055661-0
                                                • Opcode ID: a6c976802bc856d7de361a0dec3d40140abc1e93379961bd9c7d04bbae6319f2
                                                • Instruction ID: f16d733cf793ccdce0c6517e9e7d664b4e160be26ab346b579881fbecb769a62
                                                • Opcode Fuzzy Hash: a6c976802bc856d7de361a0dec3d40140abc1e93379961bd9c7d04bbae6319f2
                                                • Instruction Fuzzy Hash: 7FF03A72510218FFEF058F95DC09DAE7BB8EB44352F00415AF905A6160D375AA90DBA0
                                                APIs
                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0012B25D
                                                • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 0012B270
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: InputSendkeybd_event
                                                • String ID:
                                                • API String ID: 3536248340-0
                                                • Opcode ID: 6c1696db836a9d3458c763f15b59b799c60b0132ef55df125931a3a6008623c0
                                                • Instruction ID: 4c2b865533df043d283452ff297b6f8029bb191b6ab6b04389a22c32e88b160b
                                                • Opcode Fuzzy Hash: 6c1696db836a9d3458c763f15b59b799c60b0132ef55df125931a3a6008623c0
                                                • Instruction Fuzzy Hash: 87F01D7190438EEFDB059FA0D805BAE7FB4FF08305F008009F965A9192D3799651DF94
                                                APIs
                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,001211FC), ref: 001210D4
                                                • CloseHandle.KERNEL32(?,?,001211FC), ref: 001210E9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                • String ID:
                                                • API String ID: 81990902-0
                                                • Opcode ID: 177dc07f7a10f2a4f54d087e80821476dac0ba2ff54ea4df786c68301998564f
                                                • Instruction ID: dceaa8d01bf5b5fc6d5ed2aa3b99623eb69282d3441e4142f1ed522b2b7e2c56
                                                • Opcode Fuzzy Hash: 177dc07f7a10f2a4f54d087e80821476dac0ba2ff54ea4df786c68301998564f
                                                • Instruction Fuzzy Hash: 64E04F32004711EEE7252B51FC05EB377A9EB04311B10C82EF4A6844B2DB626CE0DB60
                                                APIs
                                                • GetWindowLongW.USER32(?,000000EC), ref: 00159542
                                                • NtdllDialogWndProc_W.NTDLL(?,00000084,00000000,?,?,001176FB,?,?,?,?), ref: 0015956C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: DialogLongNtdllProc_Window
                                                • String ID:
                                                • API String ID: 2065330234-0
                                                • Opcode ID: 81cef1f0458ba7c10b108d08770fb8d3509347c392ae47a4ce8827ba0c25e8e2
                                                • Instruction ID: 3e44ac85458806e770e2bfa422724f58e8c66d9324a471e955d64fde850b5ef3
                                                • Opcode Fuzzy Hash: 81cef1f0458ba7c10b108d08770fb8d3509347c392ae47a4ce8827ba0c25e8e2
                                                • Instruction Fuzzy Hash: 44E04F30104314FAEB150F19DC09FB93B54E700B92F104116F9669C0E1E7B195E0D260
                                                Strings
                                                • Variable is not of type 'Object'., xrefs: 00110C40
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Variable is not of type 'Object'.
                                                • API String ID: 0-1840281001
                                                • Opcode ID: 792fed0c3a862d251ecd8234586a3c2e8859c6fba0acd55bbc824090f440411c
                                                • Instruction ID: 9979707c0b50a7abf1641d50c85473d600861e4d040bd5c92c532e790d046c47
                                                • Opcode Fuzzy Hash: 792fed0c3a862d251ecd8234586a3c2e8859c6fba0acd55bbc824090f440411c
                                                • Instruction Fuzzy Hash: 66327E74900218DBEF18DF94D881FEDB7B5BF09304F14406DE80AAB292D775AE86CB61
                                                APIs
                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,000F6766,?,?,00000008,?,?,000FFEFE,00000000), ref: 000F6998
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ExceptionRaise
                                                • String ID:
                                                • API String ID: 3997070919-0
                                                • Opcode ID: 3d38beff9b730ad736290ed9ddfe32c8526d361d6fc7438ce93ee7d1cde36725
                                                • Instruction ID: 895153ecf58358ce0267c247208f493558a8d0cf2063f83394a9e3ce3737edc8
                                                • Opcode Fuzzy Hash: 3d38beff9b730ad736290ed9ddfe32c8526d361d6fc7438ce93ee7d1cde36725
                                                • Instruction Fuzzy Hash: BEB16C31610608DFD755CF28C486B647BE0FF45364F29865CE99ACF6A2C736E982DB40
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID: 0-3916222277
                                                • Opcode ID: 2df3c592bf445074fe3cd051023d91f9f603b7fd656f093ed65bd13792bc200a
                                                • Instruction ID: e4f8145430d1d2876609337952a3140a967ae97fae00ba0bd1c44ae1e3f2fbc7
                                                • Opcode Fuzzy Hash: 2df3c592bf445074fe3cd051023d91f9f603b7fd656f093ed65bd13792bc200a
                                                • Instruction Fuzzy Hash: F7124175900229DBDB64CF58C881AEEB7F5FF48710F15816AE849EB255DB309E81CBA0
                                                APIs
                                                  • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                                • NtdllDialogWndProc_W.NTDLL(?,00000112,?,?), ref: 0015A38F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: DialogLongNtdllProc_Window
                                                • String ID:
                                                • API String ID: 2065330234-0
                                                • Opcode ID: 8358955304abba47a3ac037e82e1d427075d5ece26e02ccfde14c02af62179bd
                                                • Instruction ID: 35391ca75ae36d7db2ccd82c610f3d1598c6ae9f87b738338c57f627eeb81316
                                                • Opcode Fuzzy Hash: 8358955304abba47a3ac037e82e1d427075d5ece26e02ccfde14c02af62179bd
                                                • Instruction Fuzzy Hash: C3110331244211FAFB295B28CD15B7D3A54FF41B6AF644325FD310E5E2C7605D88D256
                                                APIs
                                                  • Part of subcall function 000D9944: GetWindowLongW.USER32(?,000000EB), ref: 000D9952
                                                • CallWindowProcW.USER32(?,?,00000020,?,?), ref: 001587F3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$CallLongProc
                                                • String ID:
                                                • API String ID: 4084987330-0
                                                • Opcode ID: 3cff4edf2cb98d4dfe337b33e317939ce90886db3915e8015b21f62357b47809
                                                • Instruction ID: 4350ed3890eb579a7c2fa26e2bf9ce32a8026904cc2dab852382afc66cbc320e
                                                • Opcode Fuzzy Hash: 3cff4edf2cb98d4dfe337b33e317939ce90886db3915e8015b21f62357b47809
                                                • Instruction Fuzzy Hash: 60F0F931604209EFCF05AF94EC54DB93BA6EB09362B148515FD256E661DB32ACA0EB90
                                                APIs
                                                  • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                                  • Part of subcall function 000D912D: GetCursorPos.USER32(?), ref: 000D9141
                                                  • Part of subcall function 000D912D: ScreenToClient.USER32(00000000,?), ref: 000D915E
                                                  • Part of subcall function 000D912D: GetAsyncKeyState.USER32(00000001), ref: 000D9183
                                                  • Part of subcall function 000D912D: GetAsyncKeyState.USER32(00000002), ref: 000D919D
                                                • NtdllDialogWndProc_W.NTDLL(?,00000204,?,?,00000001,?,?,?,00117818,?,?,?,?,?,00000001,?), ref: 00158AF8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: AsyncState$ClientCursorDialogLongNtdllProc_ScreenWindow
                                                • String ID:
                                                • API String ID: 2356834413-0
                                                • Opcode ID: a8e30813f4b9481312ba7e3bf09b43a0563564e2451f617c60249c75a55770be
                                                • Instruction ID: 4b4ff15e5029b655c60a05bb43ae0215eff1cbacd12a27dd55f07cbc1f83b221
                                                • Opcode Fuzzy Hash: a8e30813f4b9481312ba7e3bf09b43a0563564e2451f617c60249c75a55770be
                                                • Instruction Fuzzy Hash: 7CF01274240219EBDB146F15D81AAAA3F65EB007A1F004016FD262A292DBB699E4DBE4
                                                APIs
                                                  • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                                • NtdllDialogWndProc_W.NTDLL(?,00000006,?,?,?), ref: 000D9096
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: DialogLongNtdllProc_Window
                                                • String ID:
                                                • API String ID: 2065330234-0
                                                • Opcode ID: 4aed3d8b8631e1e59129bd37f05200153910bd65b149f877ceca8e1d259aea39
                                                • Instruction ID: 44c9f1c36e31d808e4c94815b475177974bee72abcfc7e5b41fe90db69fc2050
                                                • Opcode Fuzzy Hash: 4aed3d8b8631e1e59129bd37f05200153910bd65b149f877ceca8e1d259aea39
                                                • Instruction Fuzzy Hash: B4F01234600319EFDB188F15E855A763BA2FB413A1F60811EF8520A7E1D77399D1EBA0
                                                APIs
                                                • BlockInput.USER32(00000001), ref: 0013EABD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: BlockInput
                                                • String ID:
                                                • API String ID: 3456056419-0
                                                • Opcode ID: ab50f7b015be60922e0a89240a31b1c3c955a0f76ed630dc861c9d0d85335104
                                                • Instruction ID: 1dd19c41904bc87e2d50f6432a8098db728ad200409080f89841ac4314d389d7
                                                • Opcode Fuzzy Hash: ab50f7b015be60922e0a89240a31b1c3c955a0f76ed630dc861c9d0d85335104
                                                • Instruction Fuzzy Hash: B2E04F312003059FD710EF59D805E9AF7E9AF98760F00842AFC49CB391DB70E8418B90
                                                APIs
                                                • NtdllDialogWndProc_W.NTDLL(?,00000232,?,?), ref: 001593C0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: DialogNtdllProc_
                                                • String ID:
                                                • API String ID: 3239928679-0
                                                • Opcode ID: 17af1cede34318ab8c968c29d59db5129b57dc88b86a5d7d4d724a88a928f97f
                                                • Instruction ID: bf5e4ea7ae1defe0da0511d87953307c2de335aafbc7b61754a999beccd86707
                                                • Opcode Fuzzy Hash: 17af1cede34318ab8c968c29d59db5129b57dc88b86a5d7d4d724a88a928f97f
                                                • Instruction Fuzzy Hash: ADF03931644355FFDB21DF58DC05FC63BA5AB06761F044009BA252B2E1CB7179A0E7A0
                                                APIs
                                                  • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                                • NtdllDialogWndProc_W.NTDLL(?,00000007,?,00000000,00000000,?,?), ref: 000D90D5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: DialogLongNtdllProc_Window
                                                • String ID:
                                                • API String ID: 2065330234-0
                                                • Opcode ID: 6b78c477f1c673c15a196fc4db101f25ab162b56db125de3e085ee058e2e9253
                                                • Instruction ID: 9191080e99da5ccc90a411c58c042d49c8eb44cd13bb210b95d5e439e7cb1611
                                                • Opcode Fuzzy Hash: 6b78c477f1c673c15a196fc4db101f25ab162b56db125de3e085ee058e2e9253
                                                • Instruction Fuzzy Hash: 99E0EC35650304FBDF15AF90DC11EA43B26FB49395F108019FA151A6A2CB73A9A1DB60
                                                APIs
                                                • NtdllDialogWndProc_W.NTDLL(?,00000053,?,?,?,00117723,?,?,?,?,?,?), ref: 001593F6
                                                  • Part of subcall function 00158172: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00193018,0019305C), ref: 001581BF
                                                  • Part of subcall function 00158172: CloseHandle.KERNEL32 ref: 001581D1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CloseCreateDialogHandleNtdllProc_Process
                                                • String ID:
                                                • API String ID: 4178364262-0
                                                • Opcode ID: 86b0313ca78f6fb2be531b3f3a3720cca70710112b3740fbfa8e92a9394e579a
                                                • Instruction ID: fa512816eb5bab08f447149c597b7ee9734bd95f5c61170ec922bbbc82e293dd
                                                • Opcode Fuzzy Hash: 86b0313ca78f6fb2be531b3f3a3720cca70710112b3740fbfa8e92a9394e579a
                                                • Instruction Fuzzy Hash: 75E0B631214209EFCB01AF54DC95E963BB6FB08352F014055FE255B2B2CB32A9A5EF51
                                                APIs
                                                  • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                                  • Part of subcall function 000D8BCD: DestroyWindow.USER32(?), ref: 000D8C81
                                                  • Part of subcall function 000D8BCD: KillTimer.USER32(00000000,?,?,?,?,000D8BBA,00000000,?), ref: 000D8D1B
                                                • NtdllDialogWndProc_W.NTDLL(?,00000002,00000000,00000000,00000000,?), ref: 000D8BC3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$DestroyDialogKillLongNtdllProc_Timer
                                                • String ID:
                                                • API String ID: 2797419724-0
                                                • Opcode ID: 56d6c093a90ea2709f1e99019684394011259aa81ed6aa6966a073b76ad7809b
                                                • Instruction ID: 646c6740ea0e7f4350ba6d2dbe364a7204b549271151c57dd5ef164202c04ae0
                                                • Opcode Fuzzy Hash: 56d6c093a90ea2709f1e99019684394011259aa81ed6aa6966a073b76ad7809b
                                                • Instruction Fuzzy Hash: ADD01270290308BBEE102BA1DC07F893A199B007A1F008022F604392D2CBB2649055A8
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,000E03EE), ref: 000E09DA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: 03391f66fb04785be65405be740459772f58e877bccce36d50f0432b68ca1e3a
                                                • Instruction ID: dcf4ef48895afd9597ad5215be1ea7a8f1ab6bdb81cc765ab5c9fb2bc9d243ec
                                                • Opcode Fuzzy Hash: 03391f66fb04785be65405be740459772f58e877bccce36d50f0432b68ca1e3a
                                                • Instruction Fuzzy Hash:
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0
                                                • API String ID: 0-4108050209
                                                • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                • Instruction ID: 09da0e2873799e4f8b458868389a39aa8fd1336a06e8cfb83cf2f498919d77fb
                                                • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                • Instruction Fuzzy Hash: 2451977168C6C55FDBB8856B8A597FE23C99F62300F18051AD98EF7283CE11DE01D352
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ed164f075aef45cbf62344498d9acb0b56fd6f53942877fa71c08462a0db5d79
                                                • Instruction ID: 83e1b719a77c3f9e1b37c8abd5cf33fa2eed58322d96203af69dad9430a4ed7f
                                                • Opcode Fuzzy Hash: ed164f075aef45cbf62344498d9acb0b56fd6f53942877fa71c08462a0db5d79
                                                • Instruction Fuzzy Hash: C2323222D29F054DD7639634CC22336A289AFB73C5F15C737E81AB5EAAEB69C4C35101
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a1daeb65b9b887988e0d5492a9fe2890e00cdc49ec5d53346e7f0deafe4ef91a
                                                • Instruction ID: 9ec4cc2e1abdf30387b77ddf22867a9f6e50c9886598dcb02bb9aeeaa7b6b11a
                                                • Opcode Fuzzy Hash: a1daeb65b9b887988e0d5492a9fe2890e00cdc49ec5d53346e7f0deafe4ef91a
                                                • Instruction Fuzzy Hash: B5320131A842168BDF2CCA28C594AFD7BA1AF45300F29817BD95A8B791E330DDC1DBD1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 40355665c450f3b8d901c6d13e2ccb658f71da38bcd1dbfe25ed76a46c75a411
                                                • Instruction ID: 3c31fdb879a3ca499b5864be6133bd625d96bae0837d560d6aa964c72ef2455d
                                                • Opcode Fuzzy Hash: 40355665c450f3b8d901c6d13e2ccb658f71da38bcd1dbfe25ed76a46c75a411
                                                • Instruction Fuzzy Hash: 41227D70A0460A9FDF14CFA4C881BEEB7B6FF44300F144529E856AB291EB76AE55CF50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e6932331081c36afc38f8bf15ce0ae304d0cd7e4bb77a1c9779c35e4e0cb5908
                                                • Instruction ID: 527bba27562e6b7fee4cf4fab65104abc428ae5ca697ed64da699e87014f551e
                                                • Opcode Fuzzy Hash: e6932331081c36afc38f8bf15ce0ae304d0cd7e4bb77a1c9779c35e4e0cb5908
                                                • Instruction Fuzzy Hash: 0E02C5B0A0020AEBDB04DF55D981BAEB7F5FF44300F118569E8569B3D1EB71EA60CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                • Instruction ID: 83586e4f31aa9770d4b25d885616c28e0874cee028d1af9f8970685c8eb0108f
                                                • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                • Instruction Fuzzy Hash: 7091757260D0E34EDB69463B85744BEFFE15F923A131A079EE4F2EA1C1EE348954D620
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                • Instruction ID: 930e137f5fe05022a88224b11b57d7163c88818408e11b138ed99675d706f060
                                                • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                • Instruction Fuzzy Hash: 5A9110722090E34EDBA9467B85740BEFFE15B923A131E07AED4F2EA1C1FE348554D620
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2a4ed5df518b71ff1141161c4ca5776b39a58ea48c0641888a82d93f6dd532c0
                                                • Instruction ID: 43e36337a6b00c3a361aec025f8c72ffa79d6bd9efd61115ee6c8d4604ec960c
                                                • Opcode Fuzzy Hash: 2a4ed5df518b71ff1141161c4ca5776b39a58ea48c0641888a82d93f6dd532c0
                                                • Instruction Fuzzy Hash: F5616A716087C99EDAB4992B4855BFF33D8DF81700F28492DE94EFB282D7119E42C316
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a3676d619fea96b7672b781962a8bd76f7ee755a8a224e947ea0908db589811d
                                                • Instruction ID: 0175598e64e41a756dca68d92176390ebbe10a6eced97735d38570edcbc48924
                                                • Opcode Fuzzy Hash: a3676d619fea96b7672b781962a8bd76f7ee755a8a224e947ea0908db589811d
                                                • Instruction Fuzzy Hash: 1E61897120C7C96EDAB84A2B4C91BFE23E9DF46700F10495AE84FFB382DA129D428311
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                • Instruction ID: 851cbf7890a22c5ec2f426a73c8a012cebcbc9b46d1f71a18e656659bbd6678b
                                                • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                • Instruction Fuzzy Hash: 888150726090E34EDBAD423B85744BEFFE15B923A131A079ED4F2DA1C2EE348554E620
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5ee4ba6130d4f83a450e2360fc425a827998d09906dc4116e31f1cd4938c05e9
                                                • Instruction ID: 6a96f9a6200a82dd70e9322c4ec9f8a680acdde617eb360df9d1431bad13ed2b
                                                • Opcode Fuzzy Hash: 5ee4ba6130d4f83a450e2360fc425a827998d09906dc4116e31f1cd4938c05e9
                                                • Instruction Fuzzy Hash: 9E21E7322216118BDB2CCF79C8236BE73E5A754320F14862EE4A7C37D0DE39A944CB80
                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 00142B30
                                                • DeleteObject.GDI32(00000000), ref: 00142B43
                                                • DestroyWindow.USER32 ref: 00142B52
                                                • GetDesktopWindow.USER32 ref: 00142B6D
                                                • GetWindowRect.USER32(00000000), ref: 00142B74
                                                • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00142CA3
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00142CB1
                                                • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142CF8
                                                • GetClientRect.USER32(00000000,?), ref: 00142D04
                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00142D40
                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142D62
                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142D75
                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142D80
                                                • GlobalLock.KERNEL32(00000000), ref: 00142D89
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142D98
                                                • GlobalUnlock.KERNEL32(00000000), ref: 00142DA1
                                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142DA8
                                                • GlobalFree.KERNEL32(00000000), ref: 00142DB3
                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00142DC5
                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,0015FC38,00000000), ref: 00142DDB
                                                • GlobalFree.KERNEL32(00000000), ref: 00142DEB
                                                • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00142E11
                                                • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00142E30
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00142E52
                                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0014303F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                • String ID: $AutoIt v3$DISPLAY$static
                                                • API String ID: 2211948467-2373415609
                                                • Opcode ID: 7363406f8dcebc8360c5071a2104ff5fb8dcd94dc4e7ec7224bdaa4fea7c5db3
                                                • Instruction ID: 4de34e1fb412a2601c910401f35bf77e640deb5981bd2cc4c83d74c21d60fe5b
                                                • Opcode Fuzzy Hash: 7363406f8dcebc8360c5071a2104ff5fb8dcd94dc4e7ec7224bdaa4fea7c5db3
                                                • Instruction Fuzzy Hash: 52025A71900205EFDB14DF64CC89EAE7BB9FB48711F048158F915AB2A1CB70AE81CFA0
                                                APIs
                                                • SetTextColor.GDI32(?,00000000), ref: 0015712F
                                                • GetSysColorBrush.USER32(0000000F), ref: 00157160
                                                • GetSysColor.USER32(0000000F), ref: 0015716C
                                                • SetBkColor.GDI32(?,000000FF), ref: 00157186
                                                • SelectObject.GDI32(?,?), ref: 00157195
                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 001571C0
                                                • GetSysColor.USER32(00000010), ref: 001571C8
                                                • CreateSolidBrush.GDI32(00000000), ref: 001571CF
                                                • FrameRect.USER32(?,?,00000000), ref: 001571DE
                                                • DeleteObject.GDI32(00000000), ref: 001571E5
                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 00157230
                                                • FillRect.USER32(?,?,?), ref: 00157262
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00157284
                                                  • Part of subcall function 001573E8: GetSysColor.USER32(00000012), ref: 00157421
                                                  • Part of subcall function 001573E8: SetTextColor.GDI32(?,?), ref: 00157425
                                                  • Part of subcall function 001573E8: GetSysColorBrush.USER32(0000000F), ref: 0015743B
                                                  • Part of subcall function 001573E8: GetSysColor.USER32(0000000F), ref: 00157446
                                                  • Part of subcall function 001573E8: GetSysColor.USER32(00000011), ref: 00157463
                                                  • Part of subcall function 001573E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00157471
                                                  • Part of subcall function 001573E8: SelectObject.GDI32(?,00000000), ref: 00157482
                                                  • Part of subcall function 001573E8: SetBkColor.GDI32(?,00000000), ref: 0015748B
                                                  • Part of subcall function 001573E8: SelectObject.GDI32(?,?), ref: 00157498
                                                  • Part of subcall function 001573E8: InflateRect.USER32(?,000000FF,000000FF), ref: 001574B7
                                                  • Part of subcall function 001573E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001574CE
                                                  • Part of subcall function 001573E8: GetWindowLongW.USER32(00000000,000000F0), ref: 001574DB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                • String ID:
                                                • API String ID: 4124339563-0
                                                • Opcode ID: fafc460a748f85480da77716e9b764c03ea723f2a60cfea6aa960a49ec87d581
                                                • Instruction ID: 02c6def1ba9cedb79cbe5dbbef64dfce3deb2ab31fdc2b09f191e32d9507cd87
                                                • Opcode Fuzzy Hash: fafc460a748f85480da77716e9b764c03ea723f2a60cfea6aa960a49ec87d581
                                                • Instruction Fuzzy Hash: F1A1A572108701FFD7019F60DC49E5BBBAAFF89322F100A19F9629A5E1D771E984CB91
                                                APIs
                                                • DestroyWindow.USER32(00000000), ref: 0014273E
                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0014286A
                                                • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 001428A9
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 001428B9
                                                • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00142900
                                                • GetClientRect.USER32(00000000,?), ref: 0014290C
                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00142955
                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00142964
                                                • GetStockObject.GDI32(00000011), ref: 00142974
                                                • SelectObject.GDI32(00000000,00000000), ref: 00142978
                                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00142988
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00142991
                                                • DeleteDC.GDI32(00000000), ref: 0014299A
                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 001429C6
                                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 001429DD
                                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00142A1D
                                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00142A31
                                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 00142A42
                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00142A77
                                                • GetStockObject.GDI32(00000011), ref: 00142A82
                                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00142A8D
                                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00142A97
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                • API String ID: 2910397461-517079104
                                                • Opcode ID: d304f10a05baa41aef717d988d6c1cede47e82a92efcc6413cba94fab0fbce39
                                                • Instruction ID: 19d972074b38e38aa07cca1a40d5eff3890e5c26af8a50782d8d77fb41b9c231
                                                • Opcode Fuzzy Hash: d304f10a05baa41aef717d988d6c1cede47e82a92efcc6413cba94fab0fbce39
                                                • Instruction Fuzzy Hash: D9B13C71A00615AFEB14DF68CC86FAE7BB9FB08711F004519F915EB6A1D774AD80CB90
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00134AED
                                                • GetDriveTypeW.KERNEL32(?,0015CB68,?,\\.\,0015CC08), ref: 00134BCA
                                                • SetErrorMode.KERNEL32(00000000,0015CB68,?,\\.\,0015CC08), ref: 00134D36
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DriveType
                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                • API String ID: 2907320926-4222207086
                                                • Opcode ID: 705fd964072f7b21da1d4968fbfd4a3d21cebe2b6701bb111003581b73454c21
                                                • Instruction ID: 998e03fb4a306c50beadfce79322d0515ef682594c7de93f43e773dff12036af
                                                • Opcode Fuzzy Hash: 705fd964072f7b21da1d4968fbfd4a3d21cebe2b6701bb111003581b73454c21
                                                • Instruction Fuzzy Hash: D661B030605205DFCB08EF64CA82EADB7A0EB04340F249519F846AB692DB76FE45DF81
                                                APIs
                                                • DestroyWindow.USER32(?,?), ref: 000D8E14
                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 00116AC5
                                                • 6F550200.COMCTL32(?,000000FF,?), ref: 00116AFE
                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00116F43
                                                  • Part of subcall function 000D8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,000D8BE8,?,00000000,?,?,?,?,000D8BBA,00000000,?), ref: 000D8FC5
                                                • SendMessageW.USER32(?,00001053), ref: 00116F7F
                                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00116F96
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$DestroyF550200InvalidateMoveRect
                                                • String ID: 0
                                                • API String ID: 268457297-4108050209
                                                • Opcode ID: 08baadfc898c45e0640acd6cb7c42f2ac840e1681ffea36970423f2431de854f
                                                • Instruction ID: b8aa2e3e0aeb097bd7c1089dd375ae34cdd0dc0c80e05c1aedd0b743d68694cf
                                                • Opcode Fuzzy Hash: 08baadfc898c45e0640acd6cb7c42f2ac840e1681ffea36970423f2431de854f
                                                • Instruction Fuzzy Hash: 2B128C30205312EFDB29CF14D858BEAB7E5FB44305F14856AF4858B661CB32A8D2DFA1
                                                APIs
                                                • GetSysColor.USER32(00000012), ref: 00157421
                                                • SetTextColor.GDI32(?,?), ref: 00157425
                                                • GetSysColorBrush.USER32(0000000F), ref: 0015743B
                                                • GetSysColor.USER32(0000000F), ref: 00157446
                                                • CreateSolidBrush.GDI32(?), ref: 0015744B
                                                • GetSysColor.USER32(00000011), ref: 00157463
                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00157471
                                                • SelectObject.GDI32(?,00000000), ref: 00157482
                                                • SetBkColor.GDI32(?,00000000), ref: 0015748B
                                                • SelectObject.GDI32(?,?), ref: 00157498
                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 001574B7
                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 001574CE
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 001574DB
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0015752A
                                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00157554
                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 00157572
                                                • DrawFocusRect.USER32(?,?), ref: 0015757D
                                                • GetSysColor.USER32(00000011), ref: 0015758E
                                                • SetTextColor.GDI32(?,00000000), ref: 00157596
                                                • DrawTextW.USER32(?,001570F5,000000FF,?,00000000), ref: 001575A8
                                                • SelectObject.GDI32(?,?), ref: 001575BF
                                                • DeleteObject.GDI32(?), ref: 001575CA
                                                • SelectObject.GDI32(?,?), ref: 001575D0
                                                • DeleteObject.GDI32(?), ref: 001575D5
                                                • SetTextColor.GDI32(?,?), ref: 001575DB
                                                • SetBkColor.GDI32(?,?), ref: 001575E5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                • String ID:
                                                • API String ID: 1996641542-0
                                                • Opcode ID: dcd00b8342f3da1167ab114473afe68b281e4630394f6b363963aeaaeef4747e
                                                • Instruction ID: 25e42a27f3b71664d526bb835423b42d41127c5a032021fce651c8bedc5e7b25
                                                • Opcode Fuzzy Hash: dcd00b8342f3da1167ab114473afe68b281e4630394f6b363963aeaaeef4747e
                                                • Instruction Fuzzy Hash: 13613B72904318EFDB019FA4EC49AEEBFB9EB08322F114115F915AB2E1D7759980CB90
                                                APIs
                                                • GetCursorPos.USER32(?), ref: 00151128
                                                • GetDesktopWindow.USER32 ref: 0015113D
                                                • GetWindowRect.USER32(00000000), ref: 00151144
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00151199
                                                • DestroyWindow.USER32(?), ref: 001511B9
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 001511ED
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0015120B
                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0015121D
                                                • SendMessageW.USER32(00000000,00000421,?,?), ref: 00151232
                                                • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00151245
                                                • IsWindowVisible.USER32(00000000), ref: 001512A1
                                                • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 001512BC
                                                • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 001512D0
                                                • GetWindowRect.USER32(00000000,?), ref: 001512E8
                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 0015130E
                                                • GetMonitorInfoW.USER32(00000000,?), ref: 00151328
                                                • CopyRect.USER32(?,?), ref: 0015133F
                                                • SendMessageW.USER32(00000000,00000412,00000000), ref: 001513AA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                • String ID: ($0$tooltips_class32
                                                • API String ID: 698492251-4156429822
                                                • Opcode ID: 0d856d7f3562eef8f9a171aef7f1fafcf2ca1908a0be60a59e4fdf918fec7237
                                                • Instruction ID: e569b84d83ba31c074701402a7c62c3421f1caa326d5d55af9177731a0552f2a
                                                • Opcode Fuzzy Hash: 0d856d7f3562eef8f9a171aef7f1fafcf2ca1908a0be60a59e4fdf918fec7237
                                                • Instruction Fuzzy Hash: 22B15771604341EFD705DF64C885BAABBE4FF88351F00891CF9A99B2A2D771E849CB91
                                                APIs
                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 000D8968
                                                • GetSystemMetrics.USER32(00000007), ref: 000D8970
                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 000D899B
                                                • GetSystemMetrics.USER32(00000008), ref: 000D89A3
                                                • GetSystemMetrics.USER32(00000004), ref: 000D89C8
                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 000D89E5
                                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 000D89F5
                                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 000D8A28
                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 000D8A3C
                                                • GetClientRect.USER32(00000000,000000FF), ref: 000D8A5A
                                                • GetStockObject.GDI32(00000011), ref: 000D8A76
                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 000D8A81
                                                  • Part of subcall function 000D912D: GetCursorPos.USER32(?), ref: 000D9141
                                                  • Part of subcall function 000D912D: ScreenToClient.USER32(00000000,?), ref: 000D915E
                                                  • Part of subcall function 000D912D: GetAsyncKeyState.USER32(00000001), ref: 000D9183
                                                  • Part of subcall function 000D912D: GetAsyncKeyState.USER32(00000002), ref: 000D919D
                                                • SetTimer.USER32(00000000,00000000,00000028,000D90FC), ref: 000D8AA8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                • String ID: AutoIt v3 GUI
                                                • API String ID: 1458621304-248962490
                                                • Opcode ID: 1f78814a1e22475077a8b61667a4015b93e3a52c6824e92c2c763fb39e0d9543
                                                • Instruction ID: 645244f3f7e8e79d5ac68d25678058ebd5b2a51b972d79b111b419c0005ef56b
                                                • Opcode Fuzzy Hash: 1f78814a1e22475077a8b61667a4015b93e3a52c6824e92c2c763fb39e0d9543
                                                • Instruction Fuzzy Hash: C2B16F75A0030AEFDB14DFA8CC55BEE7BB5FB48315F10412AFA15AB290DB70A981CB51
                                                APIs
                                                  • Part of subcall function 001210F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00121114
                                                  • Part of subcall function 001210F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 00121120
                                                  • Part of subcall function 001210F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 0012112F
                                                  • Part of subcall function 001210F9: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 00121136
                                                  • Part of subcall function 001210F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0012114D
                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00120DF5
                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00120E29
                                                • GetLengthSid.ADVAPI32(?), ref: 00120E40
                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00120E7A
                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00120E96
                                                • GetLengthSid.ADVAPI32(?), ref: 00120EAD
                                                • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00120EB5
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 00120EBC
                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00120EDD
                                                • CopySid.ADVAPI32(00000000), ref: 00120EE4
                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00120F13
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00120F35
                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00120F47
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00120F6E
                                                • HeapFree.KERNEL32(00000000), ref: 00120F75
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00120F7E
                                                • HeapFree.KERNEL32(00000000), ref: 00120F85
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00120F8E
                                                • HeapFree.KERNEL32(00000000), ref: 00120F95
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00120FA1
                                                • HeapFree.KERNEL32(00000000), ref: 00120FA8
                                                  • Part of subcall function 00121193: GetProcessHeap.KERNEL32(00000008,00120BB1,?,00000000,?,00120BB1,?), ref: 001211A1
                                                  • Part of subcall function 00121193: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 001211A8
                                                  • Part of subcall function 00121193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00120BB1,?), ref: 001211B7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Security$Free$AllocateDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                • String ID:
                                                • API String ID: 4042927181-0
                                                • Opcode ID: da880f43b62944f5c6a9a5d1690f618fa77749f5845f190df08a65cf3efe32e0
                                                • Instruction ID: 19652e365b2a03c1d3318dc9a9e76091de2655cdd5446f682e5a368ccdf26ebf
                                                • Opcode Fuzzy Hash: da880f43b62944f5c6a9a5d1690f618fa77749f5845f190df08a65cf3efe32e0
                                                • Instruction Fuzzy Hash: E3717D7290031AEFDF219FA4ED44BAEBBB8FF08311F044215F919A6192D7319955CBA0
                                                APIs
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0014C4BD
                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,0015CC08,00000000,?,00000000,?,?), ref: 0014C544
                                                • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0014C5A4
                                                • _wcslen.LIBCMT ref: 0014C5F4
                                                • _wcslen.LIBCMT ref: 0014C66F
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0014C6B2
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0014C7C1
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0014C84D
                                                • RegCloseKey.ADVAPI32(?), ref: 0014C881
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0014C88E
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0014C960
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                • API String ID: 9721498-966354055
                                                • Opcode ID: 77e905f6c23d57f3048600c1796c7ea5ec93a0c4dc23331d9ce4d8dad7a75478
                                                • Instruction ID: e6687634511ce4ecaddcc61b7109a915ac0af0a325da96162150e83c2df140d9
                                                • Opcode Fuzzy Hash: 77e905f6c23d57f3048600c1796c7ea5ec93a0c4dc23331d9ce4d8dad7a75478
                                                • Instruction Fuzzy Hash: C91224356046019FD754DF14C891F6EB7E5EF88724F15889CF88A9B2A2DB31ED41CB81
                                                APIs
                                                • CharUpperBuffW.USER32(?,?), ref: 001509C6
                                                • _wcslen.LIBCMT ref: 00150A01
                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00150A54
                                                • _wcslen.LIBCMT ref: 00150A8A
                                                • _wcslen.LIBCMT ref: 00150B06
                                                • _wcslen.LIBCMT ref: 00150B81
                                                  • Part of subcall function 000DF9F2: _wcslen.LIBCMT ref: 000DF9FD
                                                  • Part of subcall function 00122BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00122BFA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen$MessageSend$BuffCharUpper
                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                • API String ID: 1103490817-4258414348
                                                • Opcode ID: 564603bfcaae9d8d021baa178de388b252c216d8d8c328c0d6c8893ff4600f06
                                                • Instruction ID: 2408238242c4c18d087d56b1da5a220560f726e0fbc177d3ac40108de0f904c8
                                                • Opcode Fuzzy Hash: 564603bfcaae9d8d021baa178de388b252c216d8d8c328c0d6c8893ff4600f06
                                                • Instruction Fuzzy Hash: F7E1DF35208301CFC715DFA4C49096EB7E1BF98314B15895CF8AAAB3A2D730EE49CB81
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharUpper
                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                • API String ID: 1256254125-909552448
                                                • Opcode ID: f1de206829bd1dd1a826f9a0a3adbfd3d9effb525288620209695e5970b5d5b3
                                                • Instruction ID: ba71192b8de4c67bc6f792799368609e041d7518f69318802a0f1b4c6feaa0ae
                                                • Opcode Fuzzy Hash: f1de206829bd1dd1a826f9a0a3adbfd3d9effb525288620209695e5970b5d5b3
                                                • Instruction Fuzzy Hash: 0671F33260116A8BCB60DF7CC9915FE3391AFA1794B350528F866A72A5FB31CE44C7E0
                                                APIs
                                                • _wcslen.LIBCMT ref: 0015835A
                                                • _wcslen.LIBCMT ref: 0015836E
                                                • _wcslen.LIBCMT ref: 00158391
                                                • _wcslen.LIBCMT ref: 001583B4
                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 001583F2
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,0015361A,?), ref: 0015844E
                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00158487
                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 001584CA
                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00158501
                                                • FreeLibrary.KERNEL32(?), ref: 0015850D
                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0015851D
                                                • DestroyCursor.USER32(?), ref: 0015852C
                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00158549
                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00158555
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Load$Image_wcslen$LibraryMessageSend$CursorDestroyExtractFreeIcon
                                                • String ID: .dll$.exe$.icl
                                                • API String ID: 391920613-1154884017
                                                • Opcode ID: 7c8febbf0462ab4d417c2be88dcc23c9df3043737ea7ba66f33515b9295a8dd1
                                                • Instruction ID: 7df2516ab6c7da0ac2d8d2d898f3f6545676ad3b5ec096f8992cb94430fc5223
                                                • Opcode Fuzzy Hash: 7c8febbf0462ab4d417c2be88dcc23c9df3043737ea7ba66f33515b9295a8dd1
                                                • Instruction Fuzzy Hash: A2619E71510715FEEB149F64CC85BFE77A8BB08722F104509FD25EA1D1EBB4AA84CBA0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                • API String ID: 0-1645009161
                                                • Opcode ID: f74fc39db8702e612afef512c5a5071e7d5a648e9ec9b76fa6c7204e392e6f64
                                                • Instruction ID: 1e6e35bf46f4cc2f33a3c10eb107cdc4cc941da42b55dc8f86a87f3617b15e56
                                                • Opcode Fuzzy Hash: f74fc39db8702e612afef512c5a5071e7d5a648e9ec9b76fa6c7204e392e6f64
                                                • Instruction Fuzzy Hash: 6781C671644605BFDB20AF60DD42FEF37A9AF15300F044029F949AA2D7EBB0DA15DBA1
                                                APIs
                                                • LoadIconW.USER32(00000063), ref: 00125A2E
                                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00125A40
                                                • SetWindowTextW.USER32(?,?), ref: 00125A57
                                                • GetDlgItem.USER32(?,000003EA), ref: 00125A6C
                                                • SetWindowTextW.USER32(00000000,?), ref: 00125A72
                                                • GetDlgItem.USER32(?,000003E9), ref: 00125A82
                                                • SetWindowTextW.USER32(00000000,?), ref: 00125A88
                                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00125AA9
                                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00125AC3
                                                • GetWindowRect.USER32(?,?), ref: 00125ACC
                                                • _wcslen.LIBCMT ref: 00125B33
                                                • SetWindowTextW.USER32(?,?), ref: 00125B6F
                                                • GetDesktopWindow.USER32 ref: 00125B75
                                                • GetWindowRect.USER32(00000000), ref: 00125B7C
                                                • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00125BD3
                                                • GetClientRect.USER32(?,?), ref: 00125BE0
                                                • PostMessageW.USER32(?,00000005,00000000,?), ref: 00125C05
                                                • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00125C2F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                • String ID:
                                                • API String ID: 895679908-0
                                                • Opcode ID: 4dc8b35a2e6ac1b94ede25e18b5fe45451c9df37b958aa25a92dd932edd23ae1
                                                • Instruction ID: 01ead19fd84c7799bd9ebce1306edf65559687e8f77d4d2c062cf4c5e9ef6f6e
                                                • Opcode Fuzzy Hash: 4dc8b35a2e6ac1b94ede25e18b5fe45451c9df37b958aa25a92dd932edd23ae1
                                                • Instruction Fuzzy Hash: 9771AD31900B19EFDB20DFA8DE85AAEBBF6FF48705F104518E182A76A0D770E950CB50
                                                APIs
                                                • LoadCursorW.USER32(00000000,00007F89), ref: 0013FE27
                                                • LoadCursorW.USER32(00000000,00007F8A), ref: 0013FE32
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 0013FE3D
                                                • LoadCursorW.USER32(00000000,00007F03), ref: 0013FE48
                                                • LoadCursorW.USER32(00000000,00007F8B), ref: 0013FE53
                                                • LoadCursorW.USER32(00000000,00007F01), ref: 0013FE5E
                                                • LoadCursorW.USER32(00000000,00007F81), ref: 0013FE69
                                                • LoadCursorW.USER32(00000000,00007F88), ref: 0013FE74
                                                • LoadCursorW.USER32(00000000,00007F80), ref: 0013FE7F
                                                • LoadCursorW.USER32(00000000,00007F86), ref: 0013FE8A
                                                • LoadCursorW.USER32(00000000,00007F83), ref: 0013FE95
                                                • LoadCursorW.USER32(00000000,00007F85), ref: 0013FEA0
                                                • LoadCursorW.USER32(00000000,00007F82), ref: 0013FEAB
                                                • LoadCursorW.USER32(00000000,00007F84), ref: 0013FEB6
                                                • LoadCursorW.USER32(00000000,00007F04), ref: 0013FEC1
                                                • LoadCursorW.USER32(00000000,00007F02), ref: 0013FECC
                                                • GetCursorInfo.USER32(?), ref: 0013FEDC
                                                • GetLastError.KERNEL32 ref: 0013FF1E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Cursor$Load$ErrorInfoLast
                                                • String ID:
                                                • API String ID: 3215588206-0
                                                • Opcode ID: 130314c53f0f07a21846f1a16862ed3e01115641dcb6f91f4cb622a145191ae0
                                                • Instruction ID: 8227b8106438cdfcf4e1ad1017a549735355ed5643a1fb5fb64055f5f4fa9014
                                                • Opcode Fuzzy Hash: 130314c53f0f07a21846f1a16862ed3e01115641dcb6f91f4cb622a145191ae0
                                                • Instruction Fuzzy Hash: 5D4124B1D04319AADB109FBA8C89C5EBFE8FF04754B50452AE51DEB281DB78D901CF91
                                                APIs
                                                • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 000E00C6
                                                  • Part of subcall function 000E00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0019070C,00000FA0,22B2A029,?,?,?,?,001023B3,000000FF), ref: 000E011C
                                                  • Part of subcall function 000E00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,001023B3,000000FF), ref: 000E0127
                                                  • Part of subcall function 000E00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,001023B3,000000FF), ref: 000E0138
                                                  • Part of subcall function 000E00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 000E014E
                                                  • Part of subcall function 000E00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 000E015C
                                                  • Part of subcall function 000E00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 000E016A
                                                  • Part of subcall function 000E00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 000E0195
                                                  • Part of subcall function 000E00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 000E01A0
                                                • ___scrt_fastfail.LIBCMT ref: 000E00E7
                                                  • Part of subcall function 000E00A3: __onexit.LIBCMT ref: 000E00A9
                                                Strings
                                                • InitializeConditionVariable, xrefs: 000E0148
                                                • SleepConditionVariableCS, xrefs: 000E0154
                                                • api-ms-win-core-synch-l1-2-0.dll, xrefs: 000E0122
                                                • kernel32.dll, xrefs: 000E0133
                                                • WakeAllConditionVariable, xrefs: 000E0162
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                • API String ID: 66158676-1714406822
                                                • Opcode ID: 26e65e38a2f44680226cb1aaa118c2b64b68557c9429de40b6aab6cf343669a4
                                                • Instruction ID: 236bb34a75d5f244cce21c7547222afc45e7153933c5d9457546064ce3327cfc
                                                • Opcode Fuzzy Hash: 26e65e38a2f44680226cb1aaa118c2b64b68557c9429de40b6aab6cf343669a4
                                                • Instruction Fuzzy Hash: 1C21F932645751EFE7115FB5AC45B6A33E4EB04B62F00012AF841BE692DFF09C808AD0
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                • API String ID: 176396367-1603158881
                                                • Opcode ID: a771a8b1e975bc68a8d638ce15fa0c04d306d7778fb1707652916b50bf49db4c
                                                • Instruction ID: 247c8405862d2c4b2935202e5087541e389075fec99b45b63e3c799692ec0870
                                                • Opcode Fuzzy Hash: a771a8b1e975bc68a8d638ce15fa0c04d306d7778fb1707652916b50bf49db4c
                                                • Instruction Fuzzy Hash: F3E11632A00626ABCB18EF64D451BEDFBB1FF14710F15811AE466F7241DB34AFA58B90
                                                APIs
                                                • CharLowerBuffW.USER32(00000000,00000000,0015CC08), ref: 00134527
                                                • _wcslen.LIBCMT ref: 0013453B
                                                • _wcslen.LIBCMT ref: 00134599
                                                • _wcslen.LIBCMT ref: 001345F4
                                                • _wcslen.LIBCMT ref: 0013463F
                                                • _wcslen.LIBCMT ref: 001346A7
                                                  • Part of subcall function 000DF9F2: _wcslen.LIBCMT ref: 000DF9FD
                                                • GetDriveTypeW.KERNEL32(?,00186BF0,00000061), ref: 00134743
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharDriveLowerType
                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                • API String ID: 2055661098-1000479233
                                                • Opcode ID: 2127f6bc74b640b8963e7d8681bed4e05849ef2b17e58b909fcae07ad9ec63c9
                                                • Instruction ID: c103ab668acc3ceb852348c2e8eb574703daf677a8d59328495e2b5f83d6b7f0
                                                • Opcode Fuzzy Hash: 2127f6bc74b640b8963e7d8681bed4e05849ef2b17e58b909fcae07ad9ec63c9
                                                • Instruction Fuzzy Hash: 51B122716083029FC710DF28C891AAEB7E4BFA5764F50491DF496D7292E730E944CB92
                                                APIs
                                                • _wcslen.LIBCMT ref: 0014B198
                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0014B1B0
                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0014B1D4
                                                • _wcslen.LIBCMT ref: 0014B200
                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0014B214
                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0014B236
                                                • _wcslen.LIBCMT ref: 0014B332
                                                  • Part of subcall function 001305A7: GetStdHandle.KERNEL32(000000F6), ref: 001305C6
                                                • _wcslen.LIBCMT ref: 0014B34B
                                                • _wcslen.LIBCMT ref: 0014B366
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0014B3B6
                                                • GetLastError.KERNEL32(00000000), ref: 0014B407
                                                • CloseHandle.KERNEL32(?), ref: 0014B439
                                                • CloseHandle.KERNEL32(00000000), ref: 0014B44A
                                                • CloseHandle.KERNEL32(00000000), ref: 0014B45C
                                                • CloseHandle.KERNEL32(00000000), ref: 0014B46E
                                                • CloseHandle.KERNEL32(?), ref: 0014B4E3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                • String ID:
                                                • API String ID: 2178637699-0
                                                • Opcode ID: e1bd089915e519e5022ef41f9630f87cf4465fe57cbfd3f87efea58e2fe7e4dc
                                                • Instruction ID: 57007b457383b4ece040b3c5ecc82f850602d4a5b9f61c2d314e7d55f49cdb79
                                                • Opcode Fuzzy Hash: e1bd089915e519e5022ef41f9630f87cf4465fe57cbfd3f87efea58e2fe7e4dc
                                                • Instruction Fuzzy Hash: 4BF18B316083409FC714EF24C891B6EBBE5BF85714F18855DF89A9B2A2CB71EC45CB92
                                                APIs
                                                • GetMenuItemCount.USER32(00191990), ref: 00102F8D
                                                • GetMenuItemCount.USER32(00191990), ref: 0010303D
                                                • GetCursorPos.USER32(?), ref: 00103081
                                                • SetForegroundWindow.USER32(00000000), ref: 0010308A
                                                • TrackPopupMenuEx.USER32(00191990,00000000,?,00000000,00000000,00000000), ref: 0010309D
                                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 001030A9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                • String ID: 0
                                                • API String ID: 36266755-4108050209
                                                • Opcode ID: 4ce8080633882b9bf8d667f4ca5e7d6ed969b2afa6dd39ee71560d541c9fffdc
                                                • Instruction ID: 3a08711eb1169e27aa523df3b0738d10d8216f2ce975fdcf56c8612a88a28428
                                                • Opcode Fuzzy Hash: 4ce8080633882b9bf8d667f4ca5e7d6ed969b2afa6dd39ee71560d541c9fffdc
                                                • Instruction Fuzzy Hash: 2371F370644216BFEB259F64DC89FAEBF68FF05364F208216F5256A1E0C7B1A950CB90
                                                APIs
                                                • DestroyWindow.USER32(?,?), ref: 00156DEB
                                                  • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00156E5F
                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00156E81
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00156E94
                                                • DestroyWindow.USER32(?), ref: 00156EB5
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,000C0000,00000000), ref: 00156EE4
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00156EFD
                                                • GetDesktopWindow.USER32 ref: 00156F16
                                                • GetWindowRect.USER32(00000000), ref: 00156F1D
                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00156F35
                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00156F4D
                                                  • Part of subcall function 000D9944: GetWindowLongW.USER32(?,000000EB), ref: 000D9952
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                • String ID: 0$tooltips_class32
                                                • API String ID: 2429346358-3619404913
                                                • Opcode ID: 7eaa074694f524a8d4f232a1e85890d5640e446b0e7a9fb2d493316559fde984
                                                • Instruction ID: d2980b75ff6e75737208885cc1f0d7b50dc683c001117cde9582acf292676948
                                                • Opcode Fuzzy Hash: 7eaa074694f524a8d4f232a1e85890d5640e446b0e7a9fb2d493316559fde984
                                                • Instruction Fuzzy Hash: 34717970504341EFDB21CF18DC54FAABBE9FB99305F44051EF9998B261C770A98ACB91
                                                APIs
                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0013C4B0
                                                • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0013C4C3
                                                • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0013C4D7
                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0013C4F0
                                                • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0013C533
                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0013C549
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0013C554
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0013C584
                                                • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0013C5DC
                                                • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0013C5F0
                                                • InternetCloseHandle.WININET(00000000), ref: 0013C5FB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                • String ID:
                                                • API String ID: 3800310941-3916222277
                                                • Opcode ID: d19888c2a921183d54c650650c8e2e847c450c8aa866fa2d91dd59d42f53eed4
                                                • Instruction ID: 5f23fd5e2e8e4be735ef458e4e079bc816384679c890b866a131984e1052eb96
                                                • Opcode Fuzzy Hash: d19888c2a921183d54c650650c8e2e847c450c8aa866fa2d91dd59d42f53eed4
                                                • Instruction Fuzzy Hash: BC514AB1600709FFDB219FA4CD88AAB7BBCFF08755F004419F945AA610DB35E944DBA0
                                                APIs
                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00158592
                                                • GetFileSize.KERNEL32(00000000,00000000), ref: 001585A2
                                                • GlobalAlloc.KERNEL32(00000002,00000000), ref: 001585AD
                                                • CloseHandle.KERNEL32(00000000), ref: 001585BA
                                                • GlobalLock.KERNEL32(00000000), ref: 001585C8
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 001585D7
                                                • GlobalUnlock.KERNEL32(00000000), ref: 001585E0
                                                • CloseHandle.KERNEL32(00000000), ref: 001585E7
                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 001585F8
                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,0015FC38,?), ref: 00158611
                                                • GlobalFree.KERNEL32(00000000), ref: 00158621
                                                • GetObjectW.GDI32(?,00000018,000000FF), ref: 00158641
                                                • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00158671
                                                • DeleteObject.GDI32(00000000), ref: 00158699
                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 001586AF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                • String ID:
                                                • API String ID: 3840717409-0
                                                • Opcode ID: 0c8fa17a97642f755febb525b334915dbabbf168e3137a1df8689729a8cbff3e
                                                • Instruction ID: b0f1f65f32c0a6856486671a90a9eadb47acc76410925d20c70a015f5acbdc6c
                                                • Opcode Fuzzy Hash: 0c8fa17a97642f755febb525b334915dbabbf168e3137a1df8689729a8cbff3e
                                                • Instruction Fuzzy Hash: 4D411975600308EFDB119FA5CC88EAA7BB8FF89716F104158F916EB260DB309945CF60
                                                APIs
                                                • VariantInit.OLEAUT32(00000000), ref: 00131502
                                                • VariantCopy.OLEAUT32(?,?), ref: 0013150B
                                                • VariantClear.OLEAUT32(?), ref: 00131517
                                                • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 001315FB
                                                • VarR8FromDec.OLEAUT32(?,?), ref: 00131657
                                                • VariantInit.OLEAUT32(?), ref: 00131708
                                                • SysFreeString.OLEAUT32(?), ref: 0013178C
                                                • VariantClear.OLEAUT32(?), ref: 001317D8
                                                • VariantClear.OLEAUT32(?), ref: 001317E7
                                                • VariantInit.OLEAUT32(00000000), ref: 00131823
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                • API String ID: 1234038744-3931177956
                                                • Opcode ID: a963ae4dec32ccb1c3ffc7a9ca06357a2eb3dca015b14d1d0add0b7f35a5e770
                                                • Instruction ID: 0915a7c330b09240b3886f15c830174774ab2cfe60df5b1d81c46a24b7f5bf9a
                                                • Opcode Fuzzy Hash: a963ae4dec32ccb1c3ffc7a9ca06357a2eb3dca015b14d1d0add0b7f35a5e770
                                                • Instruction Fuzzy Hash: CFD11031A00205FFDB18AF65E885BBDB7B5BF46700F15845AF806AB681DB30EC45DBA1
                                                APIs
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                  • Part of subcall function 0014C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0014B6AE,?,?), ref: 0014C9B5
                                                  • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014C9F1
                                                  • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA68
                                                  • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA9E
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0014B6F4
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0014B772
                                                • RegDeleteValueW.ADVAPI32(?,?), ref: 0014B80A
                                                • RegCloseKey.ADVAPI32(?), ref: 0014B87E
                                                • RegCloseKey.ADVAPI32(?), ref: 0014B89C
                                                • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0014B8F2
                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0014B904
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 0014B922
                                                • FreeLibrary.KERNEL32(00000000), ref: 0014B983
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0014B994
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                • API String ID: 146587525-4033151799
                                                • Opcode ID: 9831ea940f98b0bb5a766eb9f57377bb0f9076e8aaf65bcaa6403cd1ba629fe5
                                                • Instruction ID: 8fbe726e8f38adfeba607226fa23e26b618d025a73c7fa4f196586af40bcc72d
                                                • Opcode Fuzzy Hash: 9831ea940f98b0bb5a766eb9f57377bb0f9076e8aaf65bcaa6403cd1ba629fe5
                                                • Instruction Fuzzy Hash: A4C17874208202EFD714DF24C4D5F6ABBE5BF84318F14849CF49A8B6A2CB71E946CB91
                                                APIs
                                                • GetDC.USER32(00000000), ref: 001425D8
                                                • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 001425E8
                                                • CreateCompatibleDC.GDI32(?), ref: 001425F4
                                                • SelectObject.GDI32(00000000,?), ref: 00142601
                                                • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0014266D
                                                • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 001426AC
                                                • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 001426D0
                                                • SelectObject.GDI32(?,?), ref: 001426D8
                                                • DeleteObject.GDI32(?), ref: 001426E1
                                                • DeleteDC.GDI32(?), ref: 001426E8
                                                • ReleaseDC.USER32(00000000,?), ref: 001426F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                • String ID: (
                                                • API String ID: 2598888154-3887548279
                                                • Opcode ID: 9faa27f8c4f938f22f3dae77f1e1fce4fd8242f457e1028f1aa126633318a41a
                                                • Instruction ID: 4c2e3508312c2c9584858dc80d611fe734d5d996d389a6372e76109831cfebda
                                                • Opcode Fuzzy Hash: 9faa27f8c4f938f22f3dae77f1e1fce4fd8242f457e1028f1aa126633318a41a
                                                • Instruction Fuzzy Hash: C861C2B5D00319EFCF04CFA4D884AAEBBB6FF58310F208529E955A7250D774A991CFA4
                                                APIs
                                                • ___free_lconv_mon.LIBCMT ref: 000FDAA1
                                                  • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD659
                                                  • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD66B
                                                  • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD67D
                                                  • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD68F
                                                  • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD6A1
                                                  • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD6B3
                                                  • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD6C5
                                                  • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD6D7
                                                  • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD6E9
                                                  • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD6FB
                                                  • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD70D
                                                  • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD71F
                                                  • Part of subcall function 000FD63C: _free.LIBCMT ref: 000FD731
                                                • _free.LIBCMT ref: 000FDA96
                                                  • Part of subcall function 000F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000), ref: 000F29DE
                                                  • Part of subcall function 000F29C8: GetLastError.KERNEL32(00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000,00000000), ref: 000F29F0
                                                • _free.LIBCMT ref: 000FDAB8
                                                • _free.LIBCMT ref: 000FDACD
                                                • _free.LIBCMT ref: 000FDAD8
                                                • _free.LIBCMT ref: 000FDAFA
                                                • _free.LIBCMT ref: 000FDB0D
                                                • _free.LIBCMT ref: 000FDB1B
                                                • _free.LIBCMT ref: 000FDB26
                                                • _free.LIBCMT ref: 000FDB5E
                                                • _free.LIBCMT ref: 000FDB65
                                                • _free.LIBCMT ref: 000FDB82
                                                • _free.LIBCMT ref: 000FDB9A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                • String ID:
                                                • API String ID: 161543041-0
                                                • Opcode ID: 44a7414a05fab99229b56e84bab1b8cc108dcfb15be0be11828b64f3651803f2
                                                • Instruction ID: 54801464c650d73b0089b187211de4d4d6f7d060ebbdc5af317783c079803a48
                                                • Opcode Fuzzy Hash: 44a7414a05fab99229b56e84bab1b8cc108dcfb15be0be11828b64f3651803f2
                                                • Instruction Fuzzy Hash: 1C315D31648209DFDB61AA38E845BBA77EAFF00311F11451AE648D7992DB71EC40A724
                                                APIs
                                                • GetClassNameW.USER32(?,?,00000100), ref: 0012369C
                                                • _wcslen.LIBCMT ref: 001236A7
                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00123797
                                                • GetClassNameW.USER32(?,?,00000400), ref: 0012380C
                                                • GetDlgCtrlID.USER32(?), ref: 0012385D
                                                • GetWindowRect.USER32(?,?), ref: 00123882
                                                • GetParent.USER32(?), ref: 001238A0
                                                • ScreenToClient.USER32(00000000), ref: 001238A7
                                                • GetClassNameW.USER32(?,?,00000100), ref: 00123921
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 0012395D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                • String ID: %s%u
                                                • API String ID: 4010501982-679674701
                                                • Opcode ID: 4c29a931e738e4808f190d22340e9b05e30fac877a4454042bfe443007a01f95
                                                • Instruction ID: 480a31db8b32b5e535182d0387b0e098785cb1b9e162939a7e21de1952dec1e7
                                                • Opcode Fuzzy Hash: 4c29a931e738e4808f190d22340e9b05e30fac877a4454042bfe443007a01f95
                                                • Instruction Fuzzy Hash: 1E91E371204316AFDB08DF24D884BEAF7A9FF45304F004619F9A9D6190DB34EAA5CB91
                                                APIs
                                                • GetClassNameW.USER32(?,?,00000400), ref: 00124994
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 001249DA
                                                • _wcslen.LIBCMT ref: 001249EB
                                                • CharUpperBuffW.USER32(?,00000000), ref: 001249F7
                                                • _wcsstr.LIBVCRUNTIME ref: 00124A2C
                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00124A64
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 00124A9D
                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00124AE6
                                                • GetClassNameW.USER32(?,?,00000400), ref: 00124B20
                                                • GetWindowRect.USER32(?,?), ref: 00124B8B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                • String ID: ThumbnailClass
                                                • API String ID: 1311036022-1241985126
                                                • Opcode ID: 31b9fa371e1b0d72fe2db54b8167bee07a998a42a8ff2241dfdd5f70c5fed088
                                                • Instruction ID: 5090bb3938485a6161690a36c5c875d10435fc34155902632d65c64268a50c82
                                                • Opcode Fuzzy Hash: 31b9fa371e1b0d72fe2db54b8167bee07a998a42a8ff2241dfdd5f70c5fed088
                                                • Instruction Fuzzy Hash: 3D91DE710043259FDB04DF14E985FAA77E8FF84314F048469FD869A196EB30EE65CBA1
                                                APIs
                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0014CC64
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0014CC8D
                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0014CD48
                                                  • Part of subcall function 0014CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0014CCAA
                                                  • Part of subcall function 0014CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0014CCBD
                                                  • Part of subcall function 0014CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0014CCCF
                                                  • Part of subcall function 0014CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0014CD05
                                                  • Part of subcall function 0014CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0014CD28
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 0014CCF3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                • API String ID: 2734957052-4033151799
                                                • Opcode ID: d0af634a031b4a05b1823aec30b54fa9eda5a19ba3d89a7935f3658f370c6403
                                                • Instruction ID: 17e2d857282f53764eb53dca7a893d6bf258bca37461a61be06c5ec37b728b77
                                                • Opcode Fuzzy Hash: d0af634a031b4a05b1823aec30b54fa9eda5a19ba3d89a7935f3658f370c6403
                                                • Instruction Fuzzy Hash: C2316975902229FBDB209F94DC88EEFBB7CEF45751F000165B906E6260DB309A85DAE0
                                                APIs
                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00133D40
                                                • _wcslen.LIBCMT ref: 00133D6D
                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00133D9D
                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00133DBE
                                                • RemoveDirectoryW.KERNEL32(?), ref: 00133DCE
                                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00133E55
                                                • CloseHandle.KERNEL32(00000000), ref: 00133E60
                                                • CloseHandle.KERNEL32(00000000), ref: 00133E6B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                • String ID: :$\$\??\%s
                                                • API String ID: 1149970189-3457252023
                                                • Opcode ID: 21052ed78f8976ef8c42b254ab20782d18b9ce5efeb2a1dfca83cf245a85a6ba
                                                • Instruction ID: ef5e767c80928eb84f85cfa2056a9666bc53ce23669ed370d4d7d9ffa64e9293
                                                • Opcode Fuzzy Hash: 21052ed78f8976ef8c42b254ab20782d18b9ce5efeb2a1dfca83cf245a85a6ba
                                                • Instruction Fuzzy Hash: 6F31A171900209ABDB219FA0DC49FEB37BDEF88701F5040B6F619E6061EB7497848B68
                                                APIs
                                                • timeGetTime.WINMM ref: 0012E6B4
                                                  • Part of subcall function 000DE551: timeGetTime.WINMM(?,?,0012E6D4), ref: 000DE555
                                                • Sleep.KERNEL32(0000000A), ref: 0012E6E1
                                                • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0012E705
                                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0012E727
                                                • SetActiveWindow.USER32 ref: 0012E746
                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0012E754
                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 0012E773
                                                • Sleep.KERNEL32(000000FA), ref: 0012E77E
                                                • IsWindow.USER32 ref: 0012E78A
                                                • EndDialog.USER32(00000000), ref: 0012E79B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                • String ID: BUTTON
                                                • API String ID: 1194449130-3405671355
                                                • Opcode ID: f1666b891133d20e7e25230337679ec41063a87a9ab86da56b3d1505cc3b3cef
                                                • Instruction ID: a58cd018d3710180bd8d65ffac8d44d0f9de0e42b03d2402974624867fe727ad
                                                • Opcode Fuzzy Hash: f1666b891133d20e7e25230337679ec41063a87a9ab86da56b3d1505cc3b3cef
                                                • Instruction Fuzzy Hash: 6A21A570204315FFEB105F60FCC9A253BA9F75474AF200426F91686EB2DB71ADE08BA4
                                                APIs
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0012EA5D
                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0012EA73
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0012EA84
                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0012EA96
                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0012EAA7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: SendString$_wcslen
                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                • API String ID: 2420728520-1007645807
                                                • Opcode ID: 1dfca27f5a58021df260711dac489fa1f97455885068bfbad56fc66fc92344d4
                                                • Instruction ID: 4fea441773fe8b1a09985cf6a30ba43b2cd82b4a57931bd6c05a91cf430b7c37
                                                • Opcode Fuzzy Hash: 1dfca27f5a58021df260711dac489fa1f97455885068bfbad56fc66fc92344d4
                                                • Instruction Fuzzy Hash: DE112131A902697DD724B7A1EC4AEFF6ABCEBD1B04F400429B411A20D1EF705A55CAB0
                                                APIs
                                                • GetDlgItem.USER32(?,00000001), ref: 00125CE2
                                                • GetWindowRect.USER32(00000000,?), ref: 00125CFB
                                                • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00125D59
                                                • GetDlgItem.USER32(?,00000002), ref: 00125D69
                                                • GetWindowRect.USER32(00000000,?), ref: 00125D7B
                                                • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00125DCF
                                                • GetDlgItem.USER32(?,000003E9), ref: 00125DDD
                                                • GetWindowRect.USER32(00000000,?), ref: 00125DEF
                                                • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00125E31
                                                • GetDlgItem.USER32(?,000003EA), ref: 00125E44
                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00125E5A
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00125E67
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$ItemMoveRect$Invalidate
                                                • String ID:
                                                • API String ID: 3096461208-0
                                                • Opcode ID: d24021537454a9bf3f907bff1e5ebea5b89bb2bab4d9252a0a944edb1858ad3e
                                                • Instruction ID: e0b0a436e47fad12bc0bf8fb4459cd6f825917ef28f508afe612e0341c615152
                                                • Opcode Fuzzy Hash: d24021537454a9bf3f907bff1e5ebea5b89bb2bab4d9252a0a944edb1858ad3e
                                                • Instruction Fuzzy Hash: 23510E71A00719AFDB18CFA8DD89AAEBBB6FB48301F148129F515E6690D7709E50CB60
                                                APIs
                                                  • Part of subcall function 000D9944: GetWindowLongW.USER32(?,000000EB), ref: 000D9952
                                                • GetSysColor.USER32(0000000F), ref: 000D9862
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ColorLongWindow
                                                • String ID:
                                                • API String ID: 259745315-0
                                                • Opcode ID: 96ca41e5ccdc8fe27e111c38c50eef29cd3f8d4002b39584020aa135d6538297
                                                • Instruction ID: 14cfb096628b35d54e8bcd075968483ad8bad871b7f520c589705faf64c6e289
                                                • Opcode Fuzzy Hash: 96ca41e5ccdc8fe27e111c38c50eef29cd3f8d4002b39584020aa135d6538297
                                                • Instruction Fuzzy Hash: 35418331104740EFDB205F389C84BB977A6AB46731F144616F9A28B3E1DB319D81EB70
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0010F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00129717
                                                • LoadStringW.USER32(00000000,?,0010F7F8,00000001), ref: 00129720
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0010F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00129742
                                                • LoadStringW.USER32(00000000,?,0010F7F8,00000001), ref: 00129745
                                                • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00129866
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: HandleLoadModuleString$Message_wcslen
                                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                • API String ID: 747408836-2268648507
                                                • Opcode ID: 73bd4626f949658e1063a74fe7813a0414de72b3a519012fd1fe5544b951b54c
                                                • Instruction ID: 5876df78d53a17464e70d115a336cc4da9f8bdc0eb4f0bc5b85f1fca4be8a5fe
                                                • Opcode Fuzzy Hash: 73bd4626f949658e1063a74fe7813a0414de72b3a519012fd1fe5544b951b54c
                                                • Instruction Fuzzy Hash: 0A413D72900219AADF14FBE4DD86EEE7778AF15340F504129F60672092EF356F58CB61
                                                APIs
                                                  • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 001207A2
                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 001207BE
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 001207DA
                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00120804
                                                • CLSIDFromString.COMBASE(?,000001FE), ref: 0012082C
                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00120837
                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0012083C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                • API String ID: 323675364-22481851
                                                • Opcode ID: e7bb84deb7c7d46b452e0bdee9842d7b18432f9cedc8e3d7933187b5b4fc5934
                                                • Instruction ID: de6f8bf96aeee6857be974838c53e2b797d65c6300a1f1f802d0518801f81bc0
                                                • Opcode Fuzzy Hash: e7bb84deb7c7d46b452e0bdee9842d7b18432f9cedc8e3d7933187b5b4fc5934
                                                • Instruction Fuzzy Hash: E341E476D10229AFDB11EFA4DC85DEEB778FF48354B044129F901A71A2EB309E54CBA0
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 00143C5C
                                                • CoInitialize.OLE32(00000000), ref: 00143C8A
                                                • CoUninitialize.COMBASE ref: 00143C94
                                                • _wcslen.LIBCMT ref: 00143D2D
                                                • GetRunningObjectTable.OLE32(00000000,?), ref: 00143DB1
                                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 00143ED5
                                                • CoGetInstanceFromFile.COMBASE(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00143F0E
                                                • CoGetObject.OLE32(?,00000000,0015FB98,?), ref: 00143F2D
                                                • SetErrorMode.KERNEL32(00000000), ref: 00143F40
                                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00143FC4
                                                • VariantClear.OLEAUT32(?), ref: 00143FD8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                • String ID:
                                                • API String ID: 429561992-0
                                                • Opcode ID: 64d539cc5923861363a3e7a4ee649bfee4e7a47708f6b0935473b26b355ae156
                                                • Instruction ID: bf9b1c57f587a15db3651fe17e555c5cfcb80080e9e6a9a1d19609d508ccd787
                                                • Opcode Fuzzy Hash: 64d539cc5923861363a3e7a4ee649bfee4e7a47708f6b0935473b26b355ae156
                                                • Instruction Fuzzy Hash: A9C123716083019FD700DF68C88496BB7E9FF89744F10491DF99A9B261D731EE46CB92
                                                APIs
                                                • CoInitialize.OLE32(00000000), ref: 00137AF3
                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00137B8F
                                                • SHGetDesktopFolder.SHELL32(?), ref: 00137BA3
                                                • CoCreateInstance.COMBASE(0015FD08,00000000,00000001,00186E6C,?), ref: 00137BEF
                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00137C74
                                                • CoTaskMemFree.COMBASE(?), ref: 00137CCC
                                                • SHBrowseForFolderW.SHELL32(?), ref: 00137D57
                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00137D7A
                                                • CoTaskMemFree.COMBASE(00000000), ref: 00137D81
                                                • CoTaskMemFree.COMBASE(00000000), ref: 00137DD6
                                                • CoUninitialize.COMBASE ref: 00137DDC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                • String ID:
                                                • API String ID: 2762341140-0
                                                • Opcode ID: 770ba2876210c985b64a3c8f980c91b5efb81036ec947262a5d6652c9539d3ba
                                                • Instruction ID: f0c3504625483b165e4b9c42c63b18c625737d6a8c6a15e751a433dda88d5b96
                                                • Opcode Fuzzy Hash: 770ba2876210c985b64a3c8f980c91b5efb81036ec947262a5d6652c9539d3ba
                                                • Instruction Fuzzy Hash: 17C1EA75A04209AFCB14DFA4C884DAEBBF9FF48314F148499E8199B662D731EE45CB90
                                                APIs
                                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00155504
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00155515
                                                • CharNextW.USER32(00000158), ref: 00155544
                                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00155585
                                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0015559B
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 001555AC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$CharNext
                                                • String ID:
                                                • API String ID: 1350042424-0
                                                • Opcode ID: 83d219cf19cbecc2664d0542190cbe8101a6dd89b29bb22dab4dae0e2dd0b32c
                                                • Instruction ID: 7ee0a0b14d8fb4fd04923b4e9f5abff2cb74e370b505bf5d8549d86ed8c4a423
                                                • Opcode Fuzzy Hash: 83d219cf19cbecc2664d0542190cbe8101a6dd89b29bb22dab4dae0e2dd0b32c
                                                • Instruction Fuzzy Hash: 37617C30904609EFDF109F94CC95AFE7BBAFB09726F104145F935AE290E7749A88DB60
                                                APIs
                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0011FAAF
                                                • SafeArrayAllocData.OLEAUT32(?), ref: 0011FB08
                                                • VariantInit.OLEAUT32(?), ref: 0011FB1A
                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 0011FB3A
                                                • VariantCopy.OLEAUT32(?,?), ref: 0011FB8D
                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 0011FBA1
                                                • VariantClear.OLEAUT32(?), ref: 0011FBB6
                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 0011FBC3
                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0011FBCC
                                                • VariantClear.OLEAUT32(?), ref: 0011FBDE
                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0011FBE9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                • String ID:
                                                • API String ID: 2706829360-0
                                                • Opcode ID: 082b2d5789c76123f3dbcd7ccc3cd8418d3ab4388c67b923e339d15f11c049c6
                                                • Instruction ID: b4cb496ccc4a2975796af34420fc9f6ad9b866fa8f6d292d2dd75eb1752ee07c
                                                • Opcode Fuzzy Hash: 082b2d5789c76123f3dbcd7ccc3cd8418d3ab4388c67b923e339d15f11c049c6
                                                • Instruction Fuzzy Hash: E0415F75A00319DFCB04DF64D854DEEBBB9FF58345F008079E945AB261DB30A986CBA0
                                                APIs
                                                • GetKeyboardState.USER32(?), ref: 00129CA1
                                                • GetAsyncKeyState.USER32(000000A0), ref: 00129D22
                                                • GetKeyState.USER32(000000A0), ref: 00129D3D
                                                • GetAsyncKeyState.USER32(000000A1), ref: 00129D57
                                                • GetKeyState.USER32(000000A1), ref: 00129D6C
                                                • GetAsyncKeyState.USER32(00000011), ref: 00129D84
                                                • GetKeyState.USER32(00000011), ref: 00129D96
                                                • GetAsyncKeyState.USER32(00000012), ref: 00129DAE
                                                • GetKeyState.USER32(00000012), ref: 00129DC0
                                                • GetAsyncKeyState.USER32(0000005B), ref: 00129DD8
                                                • GetKeyState.USER32(0000005B), ref: 00129DEA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: State$Async$Keyboard
                                                • String ID:
                                                • API String ID: 541375521-0
                                                • Opcode ID: 1b620b3900e70a997cfca1c9bf225d2bec416e30a6ca06fcfdb947a8610949a0
                                                • Instruction ID: 7c9cd0d0256c75f54ab36da518254ac273a8ebc6ac2c2c9a1e88b229d29df6eb
                                                • Opcode Fuzzy Hash: 1b620b3900e70a997cfca1c9bf225d2bec416e30a6ca06fcfdb947a8610949a0
                                                • Instruction Fuzzy Hash: 0741FC345047DE6DFF348BA8E4043B5BEE06F11344F04805ED6C65A5C2E7A499F4D7A2
                                                APIs
                                                • WSAStartup.WS2_32(00000101,?), ref: 001405BC
                                                • inet_addr.WS2_32(?), ref: 0014061C
                                                • gethostbyname.WS2_32(?), ref: 00140628
                                                • IcmpCreateFile.IPHLPAPI ref: 00140636
                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 001406C6
                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 001406E5
                                                • IcmpCloseHandle.IPHLPAPI(?), ref: 001407B9
                                                • WSACleanup.WS2_32 ref: 001407BF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                • String ID: Ping
                                                • API String ID: 1028309954-2246546115
                                                • Opcode ID: f9b179868e743058f004f38be05464fb2a1b8478e69da7192f989c5b05436641
                                                • Instruction ID: 46ec6937932cda903066112976072cb269d454940828f2c1cd91040e92de4694
                                                • Opcode Fuzzy Hash: f9b179868e743058f004f38be05464fb2a1b8478e69da7192f989c5b05436641
                                                • Instruction Fuzzy Hash: 1C916E355047019FD321DF16C889F1ABBE0EF48319F1585A9E5AA8BAB2C730ED45CF92
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharLower
                                                • String ID: cdecl$none$stdcall$winapi
                                                • API String ID: 707087890-567219261
                                                • Opcode ID: ef318721eb9d5c716075c5778dc8577478464d0ff75a005459014c75eb7b8596
                                                • Instruction ID: 37b8f98a9e250c87da76ce246a956fe6c76d74ab0641e8e85e6da8600c6f535a
                                                • Opcode Fuzzy Hash: ef318721eb9d5c716075c5778dc8577478464d0ff75a005459014c75eb7b8596
                                                • Instruction Fuzzy Hash: 82519F31A011169BCB24EFACC9509BEB7A5BF64724B214229E826F72D5EF31DE41C790
                                                APIs
                                                • CoInitialize.OLE32 ref: 00143774
                                                • CoUninitialize.COMBASE ref: 0014377F
                                                • CoCreateInstance.COMBASE(?,00000000,00000017,0015FB78,?), ref: 001437D9
                                                • IIDFromString.COMBASE(?,?), ref: 0014384C
                                                • VariantInit.OLEAUT32(?), ref: 001438E4
                                                • VariantClear.OLEAUT32(?), ref: 00143936
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                • API String ID: 636576611-1287834457
                                                • Opcode ID: 2e7437a3d2fcc0e8b871e3c7107ad67787b4a1c4c021b8f4029a94717d489747
                                                • Instruction ID: a68b9cca5c21f14b03ff3c3909b64a83985707390734239b18386596a754176e
                                                • Opcode Fuzzy Hash: 2e7437a3d2fcc0e8b871e3c7107ad67787b4a1c4c021b8f4029a94717d489747
                                                • Instruction Fuzzy Hash: 1E619F70608302AFD311DF54C849F6ABBE4EF48715F10091DF9A59B2A1D770EE49CBA2
                                                APIs
                                                • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 001333CF
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 001333F0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: LoadString$_wcslen
                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                • API String ID: 4099089115-3080491070
                                                • Opcode ID: c76d42b2d6fa52795d703616c603ceab5055287d248ea341790d9475b756ae7d
                                                • Instruction ID: 36e924fd50358d9118c302788eddd9b6c2222d9d206992a04a254c8bf0dac739
                                                • Opcode Fuzzy Hash: c76d42b2d6fa52795d703616c603ceab5055287d248ea341790d9475b756ae7d
                                                • Instruction Fuzzy Hash: EA517C7290020ABADF15EBA0DD46EEEB778AF14340F204169F515720A2EB356F98DF61
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharUpper
                                                • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                • API String ID: 1256254125-769500911
                                                • Opcode ID: eaea5beaf37c46bc4668043aeae304462023cd6af258af6a5eb41f5cd69c88db
                                                • Instruction ID: d3bcebea20d4e0d57a056aa1387da062dee46b0589d058004ca93f7bf07b3795
                                                • Opcode Fuzzy Hash: eaea5beaf37c46bc4668043aeae304462023cd6af258af6a5eb41f5cd69c88db
                                                • Instruction Fuzzy Hash: A241F632A081379BCB206F7DD9D05BE77A5BFA0B54B254229E422EB285F731CD91C790
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 001353A0
                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00135416
                                                • GetLastError.KERNEL32 ref: 00135420
                                                • SetErrorMode.KERNEL32(00000000,READY), ref: 001354A7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                • API String ID: 4194297153-14809454
                                                • Opcode ID: 317eebec5950d56496e408d98c591dc87f91546ec3334faf253e5ddcd9014334
                                                • Instruction ID: 0315036e26ba01cc1ce12fe7910c2a295f220f09759db5f0bde4934cd67933d9
                                                • Opcode Fuzzy Hash: 317eebec5950d56496e408d98c591dc87f91546ec3334faf253e5ddcd9014334
                                                • Instruction Fuzzy Hash: FF318D35A00604DFC718DF68C984FAABBB5EB45715F148069E805DB292EB71DE86CBA0
                                                APIs
                                                • CreateMenu.USER32 ref: 00153C79
                                                • SetMenu.USER32(?,00000000), ref: 00153C88
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00153D10
                                                • IsMenu.USER32(?), ref: 00153D24
                                                • CreatePopupMenu.USER32 ref: 00153D2E
                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00153D5B
                                                • DrawMenuBar.USER32 ref: 00153D63
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                • String ID: 0$F
                                                • API String ID: 161812096-3044882817
                                                • Opcode ID: 6772cbe6385cfe6006e3d71b71bc939022e5bd81208c55377085fe4f47a40b1a
                                                • Instruction ID: 9f46a3dc4b3be3834a698d122e9fd438318998bec5941e9d471f1785ca7643af
                                                • Opcode Fuzzy Hash: 6772cbe6385cfe6006e3d71b71bc939022e5bd81208c55377085fe4f47a40b1a
                                                • Instruction Fuzzy Hash: 64415675A01309EFDB14CFA4D844BAA7BB5FF49391F140029ED66AB360D770AA54CF90
                                                APIs
                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00153A9D
                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00153AA0
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00153AC7
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00153AEA
                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00153B62
                                                • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00153BAC
                                                • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00153BC7
                                                • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00153BE2
                                                • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00153BF6
                                                • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00153C13
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$LongWindow
                                                • String ID:
                                                • API String ID: 312131281-0
                                                • Opcode ID: 97c6b780b65a7baa71be3588a47845351c25f9d6d7f777e22cc685d9a9d1acd8
                                                • Instruction ID: 155fd9d9a430ba34d66c5c31a73d9773ebc8ebe6383cab2034a8a8e962f4848e
                                                • Opcode Fuzzy Hash: 97c6b780b65a7baa71be3588a47845351c25f9d6d7f777e22cc685d9a9d1acd8
                                                • Instruction Fuzzy Hash: 03617D75900248EFDB11DF68CC81EEE77B8EB09704F10019AFA25EB291C770AE85DB50
                                                APIs
                                                • GetCurrentThreadId.KERNEL32 ref: 0012B151
                                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0012A1E1,?,00000001), ref: 0012B165
                                                • GetWindowThreadProcessId.USER32(00000000), ref: 0012B16C
                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0012A1E1,?,00000001), ref: 0012B17B
                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0012B18D
                                                • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0012A1E1,?,00000001), ref: 0012B1A6
                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0012A1E1,?,00000001), ref: 0012B1B8
                                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0012A1E1,?,00000001), ref: 0012B1FD
                                                • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0012A1E1,?,00000001), ref: 0012B212
                                                • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0012A1E1,?,00000001), ref: 0012B21D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                • String ID:
                                                • API String ID: 2156557900-0
                                                • Opcode ID: ce6ce91d7e0a40c5bf98e1defffd55e89edd840974f165ba5ad9ac37fe9e1282
                                                • Instruction ID: 1b4a304dbdd65811d61518f5bfa29920f329e0232cb87178a1fbf0754cbc6ab4
                                                • Opcode Fuzzy Hash: ce6ce91d7e0a40c5bf98e1defffd55e89edd840974f165ba5ad9ac37fe9e1282
                                                • Instruction Fuzzy Hash: FB319C75514314FFDB10DF24EC88B7EBBA9BB51312F144006FA11DA691D7B4AAA0CFA0
                                                APIs
                                                • _free.LIBCMT ref: 000F2C94
                                                  • Part of subcall function 000F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000), ref: 000F29DE
                                                  • Part of subcall function 000F29C8: GetLastError.KERNEL32(00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000,00000000), ref: 000F29F0
                                                • _free.LIBCMT ref: 000F2CA0
                                                • _free.LIBCMT ref: 000F2CAB
                                                • _free.LIBCMT ref: 000F2CB6
                                                • _free.LIBCMT ref: 000F2CC1
                                                • _free.LIBCMT ref: 000F2CCC
                                                • _free.LIBCMT ref: 000F2CD7
                                                • _free.LIBCMT ref: 000F2CE2
                                                • _free.LIBCMT ref: 000F2CED
                                                • _free.LIBCMT ref: 000F2CFB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: bd737444ddd361eafb8904c17dcadaf450d54171f6ce728c3f809bb29af24c87
                                                • Instruction ID: 10e61f7a2a8d8b55aa6a3d7b340f591bd50aa01bd28e6629b71deda7e320edcf
                                                • Opcode Fuzzy Hash: bd737444ddd361eafb8904c17dcadaf450d54171f6ce728c3f809bb29af24c87
                                                • Instruction Fuzzy Hash: 6711937614410DAFCB02EF94D982CED3BA5FF05350F4144A5FA489BA22DA71EA50AB90
                                                APIs
                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 000C1459
                                                • OleUninitialize.OLE32(?,00000000), ref: 000C14F8
                                                • UnregisterHotKey.USER32(?), ref: 000C16DD
                                                • DestroyWindow.USER32(?), ref: 001024B9
                                                • FreeLibrary.KERNEL32(?), ref: 0010251E
                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0010254B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                • String ID: close all
                                                • API String ID: 469580280-3243417748
                                                • Opcode ID: ab30452b3a1efa69e28c6a09b889c074a53c5f6bf2717011352ced76deb8ccae
                                                • Instruction ID: 69568ff0d45a32e05222bfa901ecd9196ce48dd209dfc150f9f58caf9732078f
                                                • Opcode Fuzzy Hash: ab30452b3a1efa69e28c6a09b889c074a53c5f6bf2717011352ced76deb8ccae
                                                • Instruction Fuzzy Hash: 0ED13B31601212CFCB29EF14C899FADF7A5BF05700F14429DE84A6B292DB71AD16CF94
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit
                                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$_NewEnum$get__NewEnum
                                                • API String ID: 2610073882-1765764032
                                                • Opcode ID: 76d6461a9b3ce9253613b4f9592c1cf18047c53d903bbdc5de75d3f460d24ed6
                                                • Instruction ID: ec64ac9a27f8e10f4ca013c4686039c73c99d06a22362a9447157b3e7a5b21ed
                                                • Opcode Fuzzy Hash: 76d6461a9b3ce9253613b4f9592c1cf18047c53d903bbdc5de75d3f460d24ed6
                                                • Instruction Fuzzy Hash: 9C91AC71A00219EFDF24CFA4C888FAEBBB8EF46715F108559F515AB291D7709942CFA0
                                                APIs
                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00137FAD
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00137FC1
                                                • GetFileAttributesW.KERNEL32(?), ref: 00137FEB
                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00138005
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00138017
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00138060
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 001380B0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CurrentDirectory$AttributesFile
                                                • String ID: *.*
                                                • API String ID: 769691225-438819550
                                                • Opcode ID: 2ed917cfa46cb8277091c4e2ca0c83bfdcf7832e4faf74d404c52fb9ebad72c6
                                                • Instruction ID: d3cfabf06bea43877c9611cab75aa950619295a45d52e43f727a5da45fda1ec4
                                                • Opcode Fuzzy Hash: 2ed917cfa46cb8277091c4e2ca0c83bfdcf7832e4faf74d404c52fb9ebad72c6
                                                • Instruction Fuzzy Hash: A68180B15083459FCB34EF14C484AAEB3E8BB89310F544C6EF889D7291EB74DD498B52
                                                APIs
                                                • SetWindowLongW.USER32(?,000000EB), ref: 000C5C7A
                                                  • Part of subcall function 000C5D0A: GetClientRect.USER32(?,?), ref: 000C5D30
                                                  • Part of subcall function 000C5D0A: GetWindowRect.USER32(?,?), ref: 000C5D71
                                                  • Part of subcall function 000C5D0A: ScreenToClient.USER32(?,?), ref: 000C5D99
                                                • GetDC.USER32 ref: 001046F5
                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00104708
                                                • SelectObject.GDI32(00000000,00000000), ref: 00104716
                                                • SelectObject.GDI32(00000000,00000000), ref: 0010472B
                                                • ReleaseDC.USER32(?,00000000), ref: 00104733
                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 001047C4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                • String ID: U
                                                • API String ID: 4009187628-3372436214
                                                • Opcode ID: e9f44db0ad0e20cbba9f19b31094491e436849df21067a95843f472e4de7cfc7
                                                • Instruction ID: ed9c3d65080ecc21a18956f814609104b622abf71877b90327dd0a5af63a33c7
                                                • Opcode Fuzzy Hash: e9f44db0ad0e20cbba9f19b31094491e436849df21067a95843f472e4de7cfc7
                                                • Instruction Fuzzy Hash: A971DCB5400205EFCF258F64C9C4AAE3BB1FF4A361F14426AEE955A2A6D3719881DF60
                                                APIs
                                                • RtlDecodePointer.NTDLL(?), ref: 000FAFAB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: DecodePointer
                                                • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                • API String ID: 3527080286-3064271455
                                                • Opcode ID: 5e8b45f4278365749dfc9b6d4ed3bc3ee7909beb9c1f33b8e68a18e1d2feeff5
                                                • Instruction ID: 9a123bac9b6655c0eea369b71df5d68a24ef7f6193d0207c9484c21a94be0a03
                                                • Opcode Fuzzy Hash: 5e8b45f4278365749dfc9b6d4ed3bc3ee7909beb9c1f33b8e68a18e1d2feeff5
                                                • Instruction Fuzzy Hash: 6251AEB490060EDBCF24DFA8EA581FDBBF0FF49300F640195E641BBA64CB758924AB54
                                                APIs
                                                • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 001335E4
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                • LoadStringW.USER32(00192390,?,00000FFF,?), ref: 0013360A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: LoadString$_wcslen
                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                • API String ID: 4099089115-2391861430
                                                • Opcode ID: bcab51b95ccef12eac51082f8789f3813ac5567622a38f2f10dff88eae133e1b
                                                • Instruction ID: 97258a77b6899eb3afcdadafcdfaf3260ebad47467ced5a418a91b5238550aae
                                                • Opcode Fuzzy Hash: bcab51b95ccef12eac51082f8789f3813ac5567622a38f2f10dff88eae133e1b
                                                • Instruction Fuzzy Hash: 59518C7190020ABBDF14EBA0DC46EEEBB38EF14310F144129F515721A2EB311B99DFA5
                                                APIs
                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00153925
                                                • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0015393A
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00153954
                                                • _wcslen.LIBCMT ref: 00153999
                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 001539C6
                                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 001539F4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window_wcslen
                                                • String ID: -----$SysListView32
                                                • API String ID: 2147712094-3975388722
                                                • Opcode ID: 8cb3435bdf83625a07715b08f8d85c88d0762276cc53ad83f8bb556faa2a650e
                                                • Instruction ID: 3a6734ca8262f1d2ed308ce464a18402a90e447581a6f4bbd291f97a8967ccf7
                                                • Opcode Fuzzy Hash: 8cb3435bdf83625a07715b08f8d85c88d0762276cc53ad83f8bb556faa2a650e
                                                • Instruction Fuzzy Hash: 9E417571A00319EFEF259F64CC49BEA77A9EF08395F100526F964EB281D7719A84CB90
                                                APIs
                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0013C272
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0013C29A
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0013C2CA
                                                • GetLastError.KERNEL32 ref: 0013C322
                                                • SetEvent.KERNEL32(?), ref: 0013C336
                                                • InternetCloseHandle.WININET(00000000), ref: 0013C341
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                • String ID:
                                                • API String ID: 3113390036-3916222277
                                                • Opcode ID: f79b2d60727768b4f87db2701d24218ccc4097968cbfe0bd547a4f1f18c1a9c9
                                                • Instruction ID: 846196c0a4b16945b09b7f847e2c5e67bb288682ba752bb066b08fb4231971ea
                                                • Opcode Fuzzy Hash: f79b2d60727768b4f87db2701d24218ccc4097968cbfe0bd547a4f1f18c1a9c9
                                                • Instruction Fuzzy Hash: 273167B1600708AFD7219FA4DC88AAB7BFCFB59744F14851EF486A6600DB30ED459BA1
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00103AAF,?,?,Bad directive syntax error,0015CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 001298BC
                                                • LoadStringW.USER32(00000000,?,00103AAF,?), ref: 001298C3
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00129987
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: HandleLoadMessageModuleString_wcslen
                                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                • API String ID: 858772685-4153970271
                                                • Opcode ID: 8687f94c29bdc1d57df0fd0352d695c5614df166d97bcdbcf000ad40e4385b67
                                                • Instruction ID: b52d75b8fb4f9e480e476e349ce8621b6a51e4b50ab61e978a96b90c76079f78
                                                • Opcode Fuzzy Hash: 8687f94c29bdc1d57df0fd0352d695c5614df166d97bcdbcf000ad40e4385b67
                                                • Instruction Fuzzy Hash: 95217A3290031AEBCF15AF90DC4AEEE7739BF18304F04446AF515660A2EB719A68CB60
                                                APIs
                                                • GetParent.USER32 ref: 001220AB
                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 001220C0
                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0012214D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameParentSend
                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                • API String ID: 1290815626-3381328864
                                                • Opcode ID: c5d9cda3c2ff0f80a7b91dee083709a3e5694dcf5044125fc412c7498b283899
                                                • Instruction ID: 1b0a663158db1bec42ec69730e131653b2be9d2aff3c0a4a2ba5d1fc86c43f36
                                                • Opcode Fuzzy Hash: c5d9cda3c2ff0f80a7b91dee083709a3e5694dcf5044125fc412c7498b283899
                                                • Instruction Fuzzy Hash: FC11367A688316BEF7053620FC06CEA379DCF15324B200026FB04B80E2FFB169715A18
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                • String ID:
                                                • API String ID: 1282221369-0
                                                • Opcode ID: 2c83627b8ea9d1f00d35c9e6dc784d1cb5857c8de7b8c126f4c2b45da50d36ad
                                                • Instruction ID: 096757201bcd504dbe08e805e8524526ce3ad8ea3be0b5c119f375e88a999b69
                                                • Opcode Fuzzy Hash: 2c83627b8ea9d1f00d35c9e6dc784d1cb5857c8de7b8c126f4c2b45da50d36ad
                                                • Instruction Fuzzy Hash: ED61587190430DAFEB21AFB49942ABDBBE5EF05310F04017EFB4597A82DB319E05A790
                                                APIs
                                                  • Part of subcall function 000D8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,000D8BE8,?,00000000,?,?,?,?,000D8BBA,00000000,?), ref: 000D8FC5
                                                • DestroyWindow.USER32(?), ref: 000D8C81
                                                • KillTimer.USER32(00000000,?,?,?,?,000D8BBA,00000000,?), ref: 000D8D1B
                                                • DestroyAcceleratorTable.USER32(00000000), ref: 00116973
                                                • DeleteObject.GDI32(00000000), ref: 001169E6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Destroy$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                • String ID:
                                                • API String ID: 2402799130-0
                                                • Opcode ID: 4a060a5a6ba761a35917cdb94e5adba54827bc5c7a44a6de5f4502540710a681
                                                • Instruction ID: 4a78b3fe1fae012fc03417ef33207089292cc313ab8526b2cb5d0c57e93de223
                                                • Opcode Fuzzy Hash: 4a060a5a6ba761a35917cdb94e5adba54827bc5c7a44a6de5f4502540710a681
                                                • Instruction Fuzzy Hash: BD615B31512705EFCB359F14D958B69B7F1FB40316F14952EE0429BAA0CB72A9D0DFA0
                                                APIs
                                                • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00155186
                                                • ShowWindow.USER32(?,00000000), ref: 001551C7
                                                • ShowWindow.USER32(?,00000005,?,00000000), ref: 001551CD
                                                • SetFocus.USER32(?,?,00000005,?,00000000), ref: 001551D1
                                                  • Part of subcall function 00156FBA: DeleteObject.GDI32(00000000), ref: 00156FE6
                                                • GetWindowLongW.USER32(?,000000F0), ref: 0015520D
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0015521A
                                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0015524D
                                                • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00155287
                                                • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00155296
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                • String ID:
                                                • API String ID: 3210457359-0
                                                • Opcode ID: 1f6a4373d65ae7faadea8daf00e39b5ba6bc2a6ffb65e487bdd970dd852fba1f
                                                • Instruction ID: 2be3f9921045e0ee7d05fa634d7f8eeca7b28cfd13fe4134e44494d41bdaf0e8
                                                • Opcode Fuzzy Hash: 1f6a4373d65ae7faadea8daf00e39b5ba6bc2a6ffb65e487bdd970dd852fba1f
                                                • Instruction Fuzzy Hash: 7F519330A50A08FEEF249F24CC95BD83BA6EB05366F144012FD359E6E1C775A988DB51
                                                APIs
                                                • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00116890
                                                • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 001168A9
                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 001168B9
                                                • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 001168D1
                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 001168F2
                                                • DestroyCursor.USER32(00000000), ref: 00116901
                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0011691E
                                                • DestroyCursor.USER32(00000000), ref: 0011692D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CursorDestroyExtractIconImageLoadMessageSend
                                                • String ID:
                                                • API String ID: 3992029641-0
                                                • Opcode ID: df8e03b2a282dd3cbc9a2629144c1a87732eb658ef22cce2bd744cb5aab1db4c
                                                • Instruction ID: 05a86f7bd44232ac5bda3e038f24a77ce8073ae15134c40ea2819405fedb60e2
                                                • Opcode Fuzzy Hash: df8e03b2a282dd3cbc9a2629144c1a87732eb658ef22cce2bd744cb5aab1db4c
                                                • Instruction Fuzzy Hash: CD51AD70600309EFDB24CF24CC95FAA7BB5FB58365F10452AF9129B2A0DB71E990DB60
                                                APIs
                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0013C182
                                                • GetLastError.KERNEL32 ref: 0013C195
                                                • SetEvent.KERNEL32(?), ref: 0013C1A9
                                                  • Part of subcall function 0013C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0013C272
                                                  • Part of subcall function 0013C253: GetLastError.KERNEL32 ref: 0013C322
                                                  • Part of subcall function 0013C253: SetEvent.KERNEL32(?), ref: 0013C336
                                                  • Part of subcall function 0013C253: InternetCloseHandle.WININET(00000000), ref: 0013C341
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                • String ID:
                                                • API String ID: 337547030-0
                                                • Opcode ID: e92734f7963f5c3ee264b2a13b4f0023b1ac7c63df8147b1bb7e6666b3d9fde0
                                                • Instruction ID: 91cd3892d9de3af1224d18c596258b5aa7596f2fe483bc1b95dca5771195e1d3
                                                • Opcode Fuzzy Hash: e92734f7963f5c3ee264b2a13b4f0023b1ac7c63df8147b1bb7e6666b3d9fde0
                                                • Instruction Fuzzy Hash: DD315571200705EFDB219FA5DC44A6BBBE9FF28301F04442DF956AAA10D730E854ABE0
                                                APIs
                                                  • Part of subcall function 00123A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00123A57
                                                  • Part of subcall function 00123A3D: GetCurrentThreadId.KERNEL32 ref: 00123A5E
                                                  • Part of subcall function 00123A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001225B3), ref: 00123A65
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 001225BD
                                                • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 001225DB
                                                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 001225DF
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 001225E9
                                                • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00122601
                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00122605
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 0012260F
                                                • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00122623
                                                • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00122627
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                • String ID:
                                                • API String ID: 2014098862-0
                                                • Opcode ID: c063b1bfe7626b3168496e279a520b2bb8aa5c3fcbd659550e495a7a0f875562
                                                • Instruction ID: 5238e2bbca56fa7482d1b51a506223c2399eed1995a5425b821074dc0de9b0de
                                                • Opcode Fuzzy Hash: c063b1bfe7626b3168496e279a520b2bb8aa5c3fcbd659550e495a7a0f875562
                                                • Instruction Fuzzy Hash: F301D831390720FBFB106B689CCAF993F99DB5EB12F100011F314AF1D1CAF114948AA9
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00121449,?,?,00000000), ref: 0012180C
                                                • RtlAllocateHeap.NTDLL(00000000,?,00121449), ref: 00121813
                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00121449,?,?,00000000), ref: 00121828
                                                • GetCurrentProcess.KERNEL32(?,00000000,?,00121449,?,?,00000000), ref: 00121830
                                                • DuplicateHandle.KERNEL32(00000000,?,00121449,?,?,00000000), ref: 00121833
                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00121449,?,?,00000000), ref: 00121843
                                                • GetCurrentProcess.KERNEL32(00121449,00000000,?,00121449,?,?,00000000), ref: 0012184B
                                                • DuplicateHandle.KERNEL32(00000000,?,00121449,?,?,00000000), ref: 0012184E
                                                • CreateThread.KERNEL32(00000000,00000000,00121874,00000000,00000000,00000000), ref: 00121868
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Process$Current$DuplicateHandleHeap$AllocateCreateThread
                                                • String ID:
                                                • API String ID: 1422014791-0
                                                • Opcode ID: 25717365dbf7c1601a03762abf0a4181ec91d930a971a04beac4b5bf82f0651b
                                                • Instruction ID: f4f62a5016e28510474150d323d7d553f30869cbc9a08aca43b4ff09b47cb344
                                                • Opcode Fuzzy Hash: 25717365dbf7c1601a03762abf0a4181ec91d930a971a04beac4b5bf82f0651b
                                                • Instruction Fuzzy Hash: 6101A8B5640708FFE610AFA5DC89F6B3BACEB89B11F004411FA05DB5A1CA709850CB60
                                                APIs
                                                  • Part of subcall function 0012D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0012D501
                                                  • Part of subcall function 0012D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0012D50F
                                                  • Part of subcall function 0012D4DC: CloseHandle.KERNEL32(00000000), ref: 0012D5DC
                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0014A16D
                                                • GetLastError.KERNEL32 ref: 0014A180
                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0014A1B3
                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 0014A268
                                                • GetLastError.KERNEL32(00000000), ref: 0014A273
                                                • CloseHandle.KERNEL32(00000000), ref: 0014A2C4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                • String ID: SeDebugPrivilege
                                                • API String ID: 2533919879-2896544425
                                                • Opcode ID: cc3b777caf70abd482958a207ad2e47e74a798613f4cc9756244fdb50965ee0f
                                                • Instruction ID: 1991ec38b69463bdb303b94b8df2ed44868bb0e79c72d88fbd54574294b1d95a
                                                • Opcode Fuzzy Hash: cc3b777caf70abd482958a207ad2e47e74a798613f4cc9756244fdb50965ee0f
                                                • Instruction Fuzzy Hash: EF61A1302442429FD720DF14C494F5ABBE1AF54318F55849CE45A4FBA3C7B2ED46DB92
                                                APIs
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0012BCFD
                                                • IsMenu.USER32(00000000), ref: 0012BD1D
                                                • CreatePopupMenu.USER32 ref: 0012BD53
                                                • GetMenuItemCount.USER32(00B624A8), ref: 0012BDA4
                                                • InsertMenuItemW.USER32(00B624A8,?,00000001,00000030), ref: 0012BDCC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                • String ID: 0$2
                                                • API String ID: 93392585-3793063076
                                                • Opcode ID: 5d756c6dc87960146e066497a85d9ef1b239bf75c9ecfb182502c871ed741ec9
                                                • Instruction ID: 358162839800437becc528399c11af99555505faf420b107be65c636df597a3c
                                                • Opcode Fuzzy Hash: 5d756c6dc87960146e066497a85d9ef1b239bf75c9ecfb182502c871ed741ec9
                                                • Instruction Fuzzy Hash: 6751BE70A08329DBDB14CFE8E8C4BEEBBF4AF55318F148119E4519B291E7709961CB91
                                                APIs
                                                • LoadIconW.USER32(00000000,00007F03), ref: 0012C913
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: IconLoad
                                                • String ID: blank$info$question$stop$warning
                                                • API String ID: 2457776203-404129466
                                                • Opcode ID: 8538c6b751da78a53ab26b6986da8a43e8126dd480e837a77e403de60b234f5b
                                                • Instruction ID: 778f995ddd844a5860f66f27ba50125c1bda71767bbf062825a6b27a47645c7d
                                                • Opcode Fuzzy Hash: 8538c6b751da78a53ab26b6986da8a43e8126dd480e837a77e403de60b234f5b
                                                • Instruction Fuzzy Hash: C2112B31689316BEEB046B54EC83CEE379CDF15328B10003EF700A6182E7E05E5057E9
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                • String ID: 0.0.0.0
                                                • API String ID: 642191829-3771769585
                                                • Opcode ID: 4daa23b1020a7e1e8975b470f194405010b4dd504f10785cdd87e26b843bea06
                                                • Instruction ID: 47812cca35bcafcb028ed85f54bf3c3a7e9909d4bf1d161a0f6da0069eb46505
                                                • Opcode Fuzzy Hash: 4daa23b1020a7e1e8975b470f194405010b4dd504f10785cdd87e26b843bea06
                                                • Instruction Fuzzy Hash: 33110A71504315AFDB24AF60FC0ADEE77ACDF15711F020169F445AA092EF718AC18AA0
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen$LocalTime
                                                • String ID:
                                                • API String ID: 952045576-0
                                                • Opcode ID: 603063719d66416ba8c44ac90524bf28eea8685f6f07173cef914686b8cffd58
                                                • Instruction ID: 963cfaae5ed4a3639e7813f67bf5cb50e9ddf7933afac642a05a5ed9a44d2e86
                                                • Opcode Fuzzy Hash: 603063719d66416ba8c44ac90524bf28eea8685f6f07173cef914686b8cffd58
                                                • Instruction Fuzzy Hash: CC41A065C1026879CB11EBF5988A9CFB7A8AF45310F518466E618F3123FB34E255C3E6
                                                APIs
                                                • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0011682C,00000004,00000000,00000000), ref: 000DF953
                                                • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0011682C,00000004,00000000,00000000), ref: 0011F3D1
                                                • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0011682C,00000004,00000000,00000000), ref: 0011F454
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ShowWindow
                                                • String ID:
                                                • API String ID: 1268545403-0
                                                • Opcode ID: b799a95c609f48f6772fb42368679f9a777a42b9a793b1cff0db28c97ff0908f
                                                • Instruction ID: 93c2a7e17507d82b741b8280daab1e168e4b731a529cda5cafac9e8a7e8d58e1
                                                • Opcode Fuzzy Hash: b799a95c609f48f6772fb42368679f9a777a42b9a793b1cff0db28c97ff0908f
                                                • Instruction Fuzzy Hash: BB410830A18782BEC7799F2988A877ABAD2BB56314F14C03EE05796B61D73198C1C771
                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 00152D1B
                                                • GetDC.USER32(00000000), ref: 00152D23
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00152D2E
                                                • ReleaseDC.USER32(00000000,00000000), ref: 00152D3A
                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00152D76
                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00152D87
                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00155A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00152DC2
                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00152DE1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                • String ID:
                                                • API String ID: 3864802216-0
                                                • Opcode ID: 5f648900b2d9542f8eb0846feadb6ffa097d7874e65c8ac19d021933f44189f2
                                                • Instruction ID: 13a4eb7a97b2d39ffd6d2766b3332759e6cca400fe7f9219a6cc118c5c7b05bc
                                                • Opcode Fuzzy Hash: 5f648900b2d9542f8eb0846feadb6ffa097d7874e65c8ac19d021933f44189f2
                                                • Instruction Fuzzy Hash: BA316B76201314BFEB118F50DC8AFEB3BA9EB0A716F044055FE089E291C6759C90CBA4
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _memcmp
                                                • String ID:
                                                • API String ID: 2931989736-0
                                                • Opcode ID: 252e04f149c8be5bfdd42ded95327a202b5cb28326f7fef45b61312b40e6e601
                                                • Instruction ID: 8e50aa856a7f87f65c8d821ebcbad64cd829a5eb0e8da2db773df015ada695c9
                                                • Opcode Fuzzy Hash: 252e04f149c8be5bfdd42ded95327a202b5cb28326f7fef45b61312b40e6e601
                                                • Instruction Fuzzy Hash: 8D21C571A41A69BFD3189521AEC2FFB335EAF60385F440034FD04AA582F770EE2581A5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: NULL Pointer assignment$Not an Object type
                                                • API String ID: 0-572801152
                                                • Opcode ID: da742ad1442b8089a4c472cca2722d6346b3e71ff685ea2e53ac99a4f2a75326
                                                • Instruction ID: 161d618f11385ace130256a57af93d08e949ca7e86c034dfb39ef538a4240264
                                                • Opcode Fuzzy Hash: da742ad1442b8089a4c472cca2722d6346b3e71ff685ea2e53ac99a4f2a75326
                                                • Instruction Fuzzy Hash: 7CD1B175A0060AAFDF14CFA8C881FAEB7B6BF48344F148169F915AB292D770DD45CB90
                                                APIs
                                                • GetCPInfo.KERNEL32(?,?), ref: 001015CE
                                                • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00101651
                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 001016E4
                                                • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 001016FB
                                                  • Part of subcall function 000F3820: RtlAllocateHeap.NTDLL(00000000,?,00191444), ref: 000F3852
                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00101777
                                                • __freea.LIBCMT ref: 001017A2
                                                • __freea.LIBCMT ref: 001017AE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                • String ID:
                                                • API String ID: 2829977744-0
                                                • Opcode ID: 90bfda338b1ba8e6eaa45d6083ba38386e030a2d4301080a893419cf339ac5a6
                                                • Instruction ID: f8be285625cee7443e95183db45a9465af8db08009a14df5df5d36f5144d9a75
                                                • Opcode Fuzzy Hash: 90bfda338b1ba8e6eaa45d6083ba38386e030a2d4301080a893419cf339ac5a6
                                                • Instruction Fuzzy Hash: 8391B872E00216BEDB248EB4CC81AFE7BB5AF49710F184659E941EB1C1DBB9DD40CB60
                                                APIs
                                                • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0013125C
                                                • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00131284
                                                • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 001312A8
                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001312D8
                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0013135F
                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 001313C4
                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00131430
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                • String ID:
                                                • API String ID: 2550207440-0
                                                • Opcode ID: cc93ba9a526841e7423782fceb8b7fbe853a030e317cc42617f63156cb41e3cd
                                                • Instruction ID: 6a86d7165b7cd48fc157f423cb8ae9082e80987363798c1e62f61fbfdbe9b6fc
                                                • Opcode Fuzzy Hash: cc93ba9a526841e7423782fceb8b7fbe853a030e317cc42617f63156cb41e3cd
                                                • Instruction Fuzzy Hash: 8991F472A00309AFEB00DFA4C894BFEB7B5FF44325F214029E911EB292D774A941CB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ObjectSelect$BeginCreatePath
                                                • String ID:
                                                • API String ID: 3225163088-0
                                                • Opcode ID: 58c9497992c06d74d0e1b9618d40dd3a3376b85374c1c8acdd62b8e597798724
                                                • Instruction ID: a0a61dfe4b63d4b5cff9ce9aed77343e10b9d2119dc72a63d0b34f243fd8ffac
                                                • Opcode Fuzzy Hash: 58c9497992c06d74d0e1b9618d40dd3a3376b85374c1c8acdd62b8e597798724
                                                • Instruction Fuzzy Hash: A9911571900219EFCB15CFA9C884AEEBBB8FF49320F144556E515B7295D374AA82CBA0
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 0014396B
                                                • CharUpperBuffW.USER32(?,?), ref: 00143A7A
                                                • _wcslen.LIBCMT ref: 00143A8A
                                                • VariantClear.OLEAUT32(?), ref: 00143C1F
                                                  • Part of subcall function 00130CDF: VariantInit.OLEAUT32(00000000), ref: 00130D1F
                                                  • Part of subcall function 00130CDF: VariantCopy.OLEAUT32(?,?), ref: 00130D28
                                                  • Part of subcall function 00130CDF: VariantClear.OLEAUT32(?), ref: 00130D34
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                • API String ID: 4137639002-1221869570
                                                • Opcode ID: b26973907b8de3f517bace3b31d39635ec398f35b2be6dc2a8b61de0e95d7799
                                                • Instruction ID: a5eeabbf296c99287b7b7f102e4a67b3c506a2c4bbbdad69c5b7c0342d22ff80
                                                • Opcode Fuzzy Hash: b26973907b8de3f517bace3b31d39635ec398f35b2be6dc2a8b61de0e95d7799
                                                • Instruction Fuzzy Hash: C59149756083059FC704EF24C48596AB7E5FF89314F14892EF89A9B362DB30EE45CB92
                                                APIs
                                                  • Part of subcall function 0012000E: CLSIDFromProgID.COMBASE ref: 0012002B
                                                  • Part of subcall function 0012000E: ProgIDFromCLSID.COMBASE(?,00000000), ref: 00120046
                                                  • Part of subcall function 0012000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0011FF41,80070057,?,?), ref: 00120054
                                                  • Part of subcall function 0012000E: CoTaskMemFree.COMBASE(00000000), ref: 00120064
                                                • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 00144C51
                                                • _wcslen.LIBCMT ref: 00144D59
                                                • CoCreateInstanceEx.COMBASE(?,00000000,00000015,?,00000001,?), ref: 00144DCF
                                                • CoTaskMemFree.COMBASE(?), ref: 00144DDA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                • String ID: NULL Pointer assignment
                                                • API String ID: 614568839-2785691316
                                                • Opcode ID: 19ef7cd509e95810460373d4ba022e3fe5644facca11a2572e15b9cab9ed56d7
                                                • Instruction ID: baa187ed3fcc7da20255eaa633f5c4631003cac80c956213d8170fe21f57eca3
                                                • Opcode Fuzzy Hash: 19ef7cd509e95810460373d4ba022e3fe5644facca11a2572e15b9cab9ed56d7
                                                • Instruction Fuzzy Hash: 1D910471D0021DAFDF14DFA4D891EEEB7B9BF08314F108169E915BB291EB349A458FA0
                                                APIs
                                                • GetMenu.USER32(?), ref: 00152183
                                                • GetMenuItemCount.USER32(00000000), ref: 001521B5
                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 001521DD
                                                • _wcslen.LIBCMT ref: 00152213
                                                • GetMenuItemID.USER32(?,?), ref: 0015224D
                                                • GetSubMenu.USER32(?,?), ref: 0015225B
                                                  • Part of subcall function 00123A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00123A57
                                                  • Part of subcall function 00123A3D: GetCurrentThreadId.KERNEL32 ref: 00123A5E
                                                  • Part of subcall function 00123A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001225B3), ref: 00123A65
                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 001522E3
                                                  • Part of subcall function 0012E97B: Sleep.KERNEL32 ref: 0012E9F3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                • String ID:
                                                • API String ID: 4196846111-0
                                                • Opcode ID: 60ff867e6f15969ae56bb67b892e0cc0051b2d97fde22cf183bd1dc662117720
                                                • Instruction ID: 936fcd5311247ee3161152232bd2fca4a8e1c0ca32aefea7a3efc42b8a3b7d82
                                                • Opcode Fuzzy Hash: 60ff867e6f15969ae56bb67b892e0cc0051b2d97fde22cf183bd1dc662117720
                                                • Instruction Fuzzy Hash: E8718176A00205EFCB14DF64C885AAEB7F1EF49311F158469E826EF341D774EE458B90
                                                APIs
                                                • GetParent.USER32(?), ref: 0012AEF9
                                                • GetKeyboardState.USER32(?), ref: 0012AF0E
                                                • SetKeyboardState.USER32(?), ref: 0012AF6F
                                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 0012AF9D
                                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 0012AFBC
                                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 0012AFFD
                                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0012B020
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: 044b760c130b1c9da1712c7539e926b8e23d7212e9389633e10eba8a27f3057f
                                                • Instruction ID: 668bd037bc214fadaef956dffbe724aedf795881648c6070fc9e3d064966e660
                                                • Opcode Fuzzy Hash: 044b760c130b1c9da1712c7539e926b8e23d7212e9389633e10eba8a27f3057f
                                                • Instruction Fuzzy Hash: B851D3A06087E53EFB3742349D45BBABFE95F06304F088589F2E9958C2D398ACE4D751
                                                APIs
                                                • GetParent.USER32(00000000), ref: 0012AD19
                                                • GetKeyboardState.USER32(?), ref: 0012AD2E
                                                • SetKeyboardState.USER32(?), ref: 0012AD8F
                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0012ADBB
                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0012ADD8
                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0012AE17
                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0012AE38
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: 5d41d95becc887495fd85e120e48dfae792844b4aefc9e47c6b9e7a1bb461574
                                                • Instruction ID: 2690a2b1d71472dd989c9426b568d13c8089910add7ab7ee1289065eb8ffeb28
                                                • Opcode Fuzzy Hash: 5d41d95becc887495fd85e120e48dfae792844b4aefc9e47c6b9e7a1bb461574
                                                • Instruction Fuzzy Hash: 865116A05087E53EFB3683749C95B7ABEA85F05300F488488E1D5468C3D394ECA4D352
                                                APIs
                                                • GetConsoleCP.KERNEL32(00103CD6,?,?,?,?,?,?,?,?,000F5BA3,?,?,00103CD6,?,?), ref: 000F5470
                                                • __fassign.LIBCMT ref: 000F54EB
                                                • __fassign.LIBCMT ref: 000F5506
                                                • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00103CD6,00000005,00000000,00000000), ref: 000F552C
                                                • WriteFile.KERNEL32(?,00103CD6,00000000,000F5BA3,00000000,?,?,?,?,?,?,?,?,?,000F5BA3,?), ref: 000F554B
                                                • WriteFile.KERNEL32(?,?,00000001,000F5BA3,00000000,?,?,?,?,?,?,?,?,?,000F5BA3,?), ref: 000F5584
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                • String ID:
                                                • API String ID: 1324828854-0
                                                • Opcode ID: 78e7a72796f5a7db176ed3f702ec89f072a77de78797331b14a0c5eafc5c19a8
                                                • Instruction ID: 3048e01e5ca1c9f96a3417db456f294170786604d621d840916531a00690361f
                                                • Opcode Fuzzy Hash: 78e7a72796f5a7db176ed3f702ec89f072a77de78797331b14a0c5eafc5c19a8
                                                • Instruction Fuzzy Hash: DE51D171A00B099FDB11CFA8DC95AEEBBF9EF08701F14411AF655E7691D730AA41CBA0
                                                APIs
                                                • _ValidateLocalCookies.LIBCMT ref: 000E2D4B
                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 000E2D53
                                                • _ValidateLocalCookies.LIBCMT ref: 000E2DE1
                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 000E2E0C
                                                • _ValidateLocalCookies.LIBCMT ref: 000E2E61
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                • String ID: csm
                                                • API String ID: 1170836740-1018135373
                                                • Opcode ID: 1b96fd6f2f419f7aa969869e582ae4f19208ffd7e4cd15e9d371f172b1570e76
                                                • Instruction ID: af7009df11dc28df686a8fba2a795a7f3e8c3dd7d002afd457df0cd797841db5
                                                • Opcode Fuzzy Hash: 1b96fd6f2f419f7aa969869e582ae4f19208ffd7e4cd15e9d371f172b1570e76
                                                • Instruction Fuzzy Hash: 6341A035A04289AFCF10DF6ACC45ADEBBB9BF44324F148155E914BB392D771AA41CBD0
                                                APIs
                                                  • Part of subcall function 0014304E: inet_addr.WS2_32(?), ref: 0014307A
                                                  • Part of subcall function 0014304E: _wcslen.LIBCMT ref: 0014309B
                                                • socket.WS2_32(00000002,00000001,00000006), ref: 00141112
                                                • WSAGetLastError.WS2_32 ref: 00141121
                                                • WSAGetLastError.WS2_32 ref: 001411C9
                                                • closesocket.WS2_32(00000000), ref: 001411F9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                • String ID:
                                                • API String ID: 2675159561-0
                                                • Opcode ID: a148fc080fe32b85c7ef708125b1a5564054f6a8b754f6a5fca03cd2aaa08083
                                                • Instruction ID: 6c596987b9b1539883a633ba33ec0d8346ffacdf1924ff8921597c5026ee1ae4
                                                • Opcode Fuzzy Hash: a148fc080fe32b85c7ef708125b1a5564054f6a8b754f6a5fca03cd2aaa08083
                                                • Instruction Fuzzy Hash: E741D431600604AFDB109F24C885BA9BBE9EF45765F148069FD199F2A2D770AD81CBE1
                                                APIs
                                                  • Part of subcall function 0012DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0012CF22,?), ref: 0012DDFD
                                                  • Part of subcall function 0012DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0012CF22,?), ref: 0012DE16
                                                • lstrcmpiW.KERNEL32(?,?), ref: 0012CF45
                                                • MoveFileW.KERNEL32(?,?), ref: 0012CF7F
                                                • _wcslen.LIBCMT ref: 0012D005
                                                • _wcslen.LIBCMT ref: 0012D01B
                                                • SHFileOperationW.SHELL32(?), ref: 0012D061
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                • String ID: \*.*
                                                • API String ID: 3164238972-1173974218
                                                • Opcode ID: 91c7937493a4d5a440a246d38bedcb238519c7f6476c64f70b484a4836229f68
                                                • Instruction ID: a9dc0f05ac89c7189675b353ac249182715ddd9c877ba556f4baff35c5a5ac70
                                                • Opcode Fuzzy Hash: 91c7937493a4d5a440a246d38bedcb238519c7f6476c64f70b484a4836229f68
                                                • Instruction Fuzzy Hash: 154139719452299FDF12EFA4EA81EDD77F9AF18340F1000E6E645EB142EB34A794CB50
                                                APIs
                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00152E1C
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00152E4F
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00152E84
                                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00152EB6
                                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00152EE0
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00152EF1
                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00152F0B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: LongWindow$MessageSend
                                                • String ID:
                                                • API String ID: 2178440468-0
                                                • Opcode ID: 6f7c54423381fd2a4aa3785af95d3c23092b04b54e0cfdb9fcddc9cb364c9ad1
                                                • Instruction ID: cb3d0e8f9bf0489908b66315e480422ab10c483ba5b40510b4002791d308e958
                                                • Opcode Fuzzy Hash: 6f7c54423381fd2a4aa3785af95d3c23092b04b54e0cfdb9fcddc9cb364c9ad1
                                                • Instruction Fuzzy Hash: F3310332604251EFDB21CF58EC86FA537E1EB9A716F150165F9208F6B1CB71A884DB41
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00127769
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0012778F
                                                • SysAllocString.OLEAUT32(00000000), ref: 00127792
                                                • SysAllocString.OLEAUT32(?), ref: 001277B0
                                                • SysFreeString.OLEAUT32(?), ref: 001277B9
                                                • StringFromGUID2.COMBASE(?,?,00000028), ref: 001277DE
                                                • SysAllocString.OLEAUT32(?), ref: 001277EC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                • String ID:
                                                • API String ID: 3761583154-0
                                                • Opcode ID: bbc6d125faedf83491b2ebd39d933f4b97636c3bf79e52a5f63ab07f202a25f6
                                                • Instruction ID: 4ddc2cfd5814d5ee38cedaf068ddf658eb88066009213ccb1234a5616badc4ba
                                                • Opcode Fuzzy Hash: bbc6d125faedf83491b2ebd39d933f4b97636c3bf79e52a5f63ab07f202a25f6
                                                • Instruction Fuzzy Hash: 37219076604329AFDB10EFA8DC88CBB77ACEB097647048425FA15DB291D770DC8187A0
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00127842
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00127868
                                                • SysAllocString.OLEAUT32(00000000), ref: 0012786B
                                                • SysAllocString.OLEAUT32 ref: 0012788C
                                                • SysFreeString.OLEAUT32 ref: 00127895
                                                • StringFromGUID2.COMBASE(?,?,00000028), ref: 001278AF
                                                • SysAllocString.OLEAUT32(?), ref: 001278BD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                • String ID:
                                                • API String ID: 3761583154-0
                                                • Opcode ID: 7fde03d66839ec8f5e9e1fd2f58a9c8449a401beb5563deef866742a80f688a8
                                                • Instruction ID: f2ac9fa84040c262c73329a76ec2b18a8b094b4640c963bbdcdd0ddd77bc8c56
                                                • Opcode Fuzzy Hash: 7fde03d66839ec8f5e9e1fd2f58a9c8449a401beb5563deef866742a80f688a8
                                                • Instruction Fuzzy Hash: 17215E35608324EF9B149FA9EC88DBB77ECEB097607108125B915CB2A1EB70DC91CB64
                                                APIs
                                                • GetStdHandle.KERNEL32(0000000C), ref: 001304F2
                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0013052E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CreateHandlePipe
                                                • String ID: nul
                                                • API String ID: 1424370930-2873401336
                                                • Opcode ID: 26faac6b26199f791f29c9d8a9e43665b73130be0b16de393a48e719232af554
                                                • Instruction ID: a29fdd237d1c634576f10ba25353e571f5e09643214323a0854b3d1db24c47bf
                                                • Opcode Fuzzy Hash: 26faac6b26199f791f29c9d8a9e43665b73130be0b16de393a48e719232af554
                                                • Instruction Fuzzy Hash: A3216975600305EFDB219F29DC54A9A7BE4BF49724F204A19F8A1E72E0E7709980CF60
                                                APIs
                                                • GetStdHandle.KERNEL32(000000F6), ref: 001305C6
                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00130601
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CreateHandlePipe
                                                • String ID: nul
                                                • API String ID: 1424370930-2873401336
                                                • Opcode ID: 229484b413e76c7b237600f3efc7b1344ec7a4393b7a41b3b59423d1f7bb0d51
                                                • Instruction ID: 155ae74feca98e453800ce45ff7101bff5b3f2ddf1ec756d9bc72578fef147db
                                                • Opcode Fuzzy Hash: 229484b413e76c7b237600f3efc7b1344ec7a4393b7a41b3b59423d1f7bb0d51
                                                • Instruction Fuzzy Hash: 8E21B6B5500305DFDB219F69CC55A9A77E8BF99B30F200B19F8A1E72E4E77099A0CB50
                                                APIs
                                                  • Part of subcall function 000C600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 000C604C
                                                  • Part of subcall function 000C600E: GetStockObject.GDI32(00000011), ref: 000C6060
                                                  • Part of subcall function 000C600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 000C606A
                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00154112
                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0015411F
                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0015412A
                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00154139
                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00154145
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$CreateObjectStockWindow
                                                • String ID: Msctls_Progress32
                                                • API String ID: 1025951953-3636473452
                                                • Opcode ID: 44b9338130ac7a3dad3041d40d04b5be3ff0d407451e54c7182dbd6684c95f1d
                                                • Instruction ID: 7fa1a342841da37fea852ef565ae46693d5c9ecf4c18ad3c6412427958ec7553
                                                • Opcode Fuzzy Hash: 44b9338130ac7a3dad3041d40d04b5be3ff0d407451e54c7182dbd6684c95f1d
                                                • Instruction Fuzzy Hash: 8711B2B2140219BFEF119F64CC85EE77F9DEF18798F114111BA28A6190C772DC61DBA4
                                                APIs
                                                  • Part of subcall function 000FD7A3: _free.LIBCMT ref: 000FD7CC
                                                • _free.LIBCMT ref: 000FD82D
                                                  • Part of subcall function 000F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000), ref: 000F29DE
                                                  • Part of subcall function 000F29C8: GetLastError.KERNEL32(00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000,00000000), ref: 000F29F0
                                                • _free.LIBCMT ref: 000FD838
                                                • _free.LIBCMT ref: 000FD843
                                                • _free.LIBCMT ref: 000FD897
                                                • _free.LIBCMT ref: 000FD8A2
                                                • _free.LIBCMT ref: 000FD8AD
                                                • _free.LIBCMT ref: 000FD8B8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                • Instruction ID: cd737ba26dfaf364654ed884dac576c2ddce0bbd380adf366fd1631b6ff96c75
                                                • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                • Instruction Fuzzy Hash: 0B11247158470CAAD521BFB0CC47FEF7BDD6F04700F404816B399AA8A3EA69B5056650
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0012DA74
                                                • LoadStringW.USER32(00000000), ref: 0012DA7B
                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0012DA91
                                                • LoadStringW.USER32(00000000), ref: 0012DA98
                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0012DADC
                                                Strings
                                                • %s (%d) : ==> %s: %s %s, xrefs: 0012DAB9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: HandleLoadModuleString$Message
                                                • String ID: %s (%d) : ==> %s: %s %s
                                                • API String ID: 4072794657-3128320259
                                                • Opcode ID: acc24c99aee3ace133152996904fa33267099c1f2d02d06dce9d6a52beb15937
                                                • Instruction ID: 78eb0b45c965ffbe37c210bee044b665fd8401d8b5230c93d391a7c72cebb541
                                                • Opcode Fuzzy Hash: acc24c99aee3ace133152996904fa33267099c1f2d02d06dce9d6a52beb15937
                                                • Instruction Fuzzy Hash: 170162F6500318BFE710ABA4ED89EEB326CE708306F404491B706E6041EA749E848FB4
                                                APIs
                                                • InterlockedExchange.KERNEL32(00B5E518,00B5E518), ref: 0013097B
                                                • RtlEnterCriticalSection.NTDLL(00B5E4F8), ref: 0013098D
                                                • TerminateThread.KERNEL32(00000000,000001F6), ref: 0013099B
                                                • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 001309A9
                                                • CloseHandle.KERNEL32(00000000), ref: 001309B8
                                                • InterlockedExchange.KERNEL32(00B5E518,000001F6), ref: 001309C8
                                                • RtlLeaveCriticalSection.NTDLL(00B5E4F8), ref: 001309CF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                • String ID:
                                                • API String ID: 3495660284-0
                                                • Opcode ID: 3983d6e2fac9bc02f441799608a172fcc5c024d38e4ee20712033a7c805944e4
                                                • Instruction ID: 43c5c5f7abc80535bf27e359d93da0cd1bce38b4868b5938310de4cf3721ecae
                                                • Opcode Fuzzy Hash: 3983d6e2fac9bc02f441799608a172fcc5c024d38e4ee20712033a7c805944e4
                                                • Instruction Fuzzy Hash: 2AF0CD31442B12EFD7525F94EE89BDA7A65FF05706F401015F10258CA1CB7594A5CFD0
                                                APIs
                                                • GetClientRect.USER32(?,?), ref: 000C5D30
                                                • GetWindowRect.USER32(?,?), ref: 000C5D71
                                                • ScreenToClient.USER32(?,?), ref: 000C5D99
                                                • GetClientRect.USER32(?,?), ref: 000C5ED7
                                                • GetWindowRect.USER32(?,?), ref: 000C5EF8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Rect$Client$Window$Screen
                                                • String ID:
                                                • API String ID: 1296646539-0
                                                • Opcode ID: bf33e4a210cfdc4ee52079a21212455f98a967e19b1b1d5bd6d4ee396daa081c
                                                • Instruction ID: e54b078a6e1da10e557f958f70b922ac0471bb1e978b059a782feb0031d4abfa
                                                • Opcode Fuzzy Hash: bf33e4a210cfdc4ee52079a21212455f98a967e19b1b1d5bd6d4ee396daa081c
                                                • Instruction Fuzzy Hash: 7BB14C78A0074ADBDB14CFA9C880BEEB7F1BF58311F14841EE999D7250D730AA91DB54
                                                APIs
                                                • __allrem.LIBCMT ref: 000F00BA
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000F00D6
                                                • __allrem.LIBCMT ref: 000F00ED
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000F010B
                                                • __allrem.LIBCMT ref: 000F0122
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 000F0140
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                • String ID:
                                                • API String ID: 1992179935-0
                                                • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                • Instruction ID: 867f9c68ce14ac78fe5e4b8ed0ad9f3a007cfcac25d1ab3ecb33374e853bd332
                                                • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                • Instruction Fuzzy Hash: 1C811972600B0AAFE7209F69CC41BBB73E9AF41724F24453EF651D7A82EB75D9009B50
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,000E82D9,000E82D9,?,?,?,000F644F,00000001,00000001,8BE85006), ref: 000F6258
                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,000F644F,00000001,00000001,8BE85006,?,?,?), ref: 000F62DE
                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 000F63D8
                                                • __freea.LIBCMT ref: 000F63E5
                                                  • Part of subcall function 000F3820: RtlAllocateHeap.NTDLL(00000000,?,00191444), ref: 000F3852
                                                • __freea.LIBCMT ref: 000F63EE
                                                • __freea.LIBCMT ref: 000F6413
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                • String ID:
                                                • API String ID: 1414292761-0
                                                • Opcode ID: f28c1c16d1ff3ba0e72b006e36294361971dc75b40992cb30a268b959ef837d3
                                                • Instruction ID: 468905e7c5e34dc74cddaeb9976564366b4f5e20deeaf729453268d612ed4288
                                                • Opcode Fuzzy Hash: f28c1c16d1ff3ba0e72b006e36294361971dc75b40992cb30a268b959ef837d3
                                                • Instruction Fuzzy Hash: 76512172A0021AAFEB258F64CC81EBF77AAEF50750F144228FE05D7941DB36DD44E6A0
                                                APIs
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                  • Part of subcall function 0014C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0014B6AE,?,?), ref: 0014C9B5
                                                  • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014C9F1
                                                  • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA68
                                                  • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA9E
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0014BCCA
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0014BD25
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0014BD6A
                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0014BD99
                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0014BDF3
                                                • RegCloseKey.ADVAPI32(?), ref: 0014BDFF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                • String ID:
                                                • API String ID: 1120388591-0
                                                • Opcode ID: 258a863ccf6eea7e01afbe030d091d4fa0869c6ffc678cc1b6cb02862ec03065
                                                • Instruction ID: 93b73353a5ad5b78578e5b75113ca385663f30635170631e707224cc9d04f98f
                                                • Opcode Fuzzy Hash: 258a863ccf6eea7e01afbe030d091d4fa0869c6ffc678cc1b6cb02862ec03065
                                                • Instruction Fuzzy Hash: 6E815870608241AFD714DF64C8D5E6ABBE5FF84308F14899CF4598B2A2DB32ED45CB92
                                                APIs
                                                • VariantInit.OLEAUT32(00000035), ref: 0011F7B9
                                                • SysAllocString.OLEAUT32(00000001), ref: 0011F860
                                                • VariantCopy.OLEAUT32(0011FA64,00000000), ref: 0011F889
                                                • VariantClear.OLEAUT32(0011FA64), ref: 0011F8AD
                                                • VariantCopy.OLEAUT32(0011FA64,00000000), ref: 0011F8B1
                                                • VariantClear.OLEAUT32(?), ref: 0011F8BB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Variant$ClearCopy$AllocInitString
                                                • String ID:
                                                • API String ID: 3859894641-0
                                                • Opcode ID: bc0bb3ba9b66e9fe0405214b53051db75369824d1c424185ea12f77a095829db
                                                • Instruction ID: 2992341bb49fbbb7f6dca69eea46391a9ace7a0f05503d457158162ceb60f2be
                                                • Opcode Fuzzy Hash: bc0bb3ba9b66e9fe0405214b53051db75369824d1c424185ea12f77a095829db
                                                • Instruction Fuzzy Hash: 7251D531500314BACF18AF65D895BA9B3A5EF55314F24847FF806DF292DB708C85CBA6
                                                APIs
                                                  • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                                • BeginPaint.USER32(?,?,?), ref: 000D9241
                                                • GetWindowRect.USER32(?,?), ref: 000D92A5
                                                • ScreenToClient.USER32(?,?), ref: 000D92C2
                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 000D92D3
                                                • EndPaint.USER32(?,?,?,?,?), ref: 000D9321
                                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 001171EA
                                                  • Part of subcall function 000D9339: BeginPath.GDI32(00000000), ref: 000D9357
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                • String ID:
                                                • API String ID: 3050599898-0
                                                • Opcode ID: c0dde96bb26a5ab6da80b49bb6d34a42260cc9956b43bde0c08b2060d6a9af77
                                                • Instruction ID: fe58bf18ef468a28c720816b4975a0ba12778f7b0172ea05f48cfa81f726611f
                                                • Opcode Fuzzy Hash: c0dde96bb26a5ab6da80b49bb6d34a42260cc9956b43bde0c08b2060d6a9af77
                                                • Instruction Fuzzy Hash: 75419A70108301EFD721DF24CC84FBA7BB8EB59725F14062AF9A59B2E2C7319985DB61
                                                APIs
                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 0013080C
                                                • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00130847
                                                • RtlEnterCriticalSection.NTDLL(?), ref: 00130863
                                                • RtlLeaveCriticalSection.NTDLL(?), ref: 001308DC
                                                • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 001308F3
                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00130921
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                • String ID:
                                                • API String ID: 3368777196-0
                                                • Opcode ID: 018bdb57c250cc9cac73ea0c5f566ca626bef162b84412f1963cf065c242ddf6
                                                • Instruction ID: 9b8bf10acc6a2c636bea4ccf6c89fe996cad8873df4d5f84b07060516f36b075
                                                • Opcode Fuzzy Hash: 018bdb57c250cc9cac73ea0c5f566ca626bef162b84412f1963cf065c242ddf6
                                                • Instruction Fuzzy Hash: 59415871900305EFDF159F54DC85AAA77B8FF08300F1480A5E905AA29BDB70DEA0DBA0
                                                APIs
                                                • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0011F3AB,00000000,?,?,00000000,?,0011682C,00000004,00000000,00000000), ref: 0015824C
                                                • EnableWindow.USER32(00000000,00000000), ref: 00158272
                                                • ShowWindow.USER32(FFFFFFFF,00000000), ref: 001582D1
                                                • ShowWindow.USER32(00000000,00000004), ref: 001582E5
                                                • EnableWindow.USER32(00000000,00000001), ref: 0015830B
                                                • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0015832F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$Show$Enable$MessageSend
                                                • String ID:
                                                • API String ID: 642888154-0
                                                • Opcode ID: 6f9441cb30a9e3c2db0e3ba51e875167f790f32ca589b125dd6ea5847cdf9bc6
                                                • Instruction ID: 978aa05f20b3c989f60731ed994b4721ac9b9a1b68464a62cccaf19999193766
                                                • Opcode Fuzzy Hash: 6f9441cb30a9e3c2db0e3ba51e875167f790f32ca589b125dd6ea5847cdf9bc6
                                                • Instruction Fuzzy Hash: 2A41B430601745EFDF12DF15C899BE47BF1FB0A716F184169E9289F662CB31A889CB50
                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 00124C95
                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00124CB2
                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00124CEA
                                                • _wcslen.LIBCMT ref: 00124D08
                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00124D10
                                                • _wcsstr.LIBVCRUNTIME ref: 00124D1A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                • String ID:
                                                • API String ID: 72514467-0
                                                • Opcode ID: 57d4485a1f01ff04398bfa774eeb4733e6bb28e828cf3acabd8acea63d606c78
                                                • Instruction ID: 8dbd6ce5c9765f034e19d983246c83c806fb076ffc363d4126ffb37a6d0fba78
                                                • Opcode Fuzzy Hash: 57d4485a1f01ff04398bfa774eeb4733e6bb28e828cf3acabd8acea63d606c78
                                                • Instruction Fuzzy Hash: 4C210472204325BFEB155B79AC09EBB7B9CDF55750F10802AF809DA292EB61CD5086A0
                                                APIs
                                                  • Part of subcall function 000C3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,000C3A97,?,?,000C2E7F,?,?,?,00000000), ref: 000C3AC2
                                                • _wcslen.LIBCMT ref: 0013587B
                                                • CoInitialize.OLE32(00000000), ref: 00135995
                                                • CoCreateInstance.COMBASE(0015FCF8,00000000,00000001,0015FB68,?), ref: 001359AE
                                                • CoUninitialize.COMBASE ref: 001359CC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                • String ID: .lnk
                                                • API String ID: 3172280962-24824748
                                                • Opcode ID: 37899cfd718ec703756e9818332733efa08b8ab25d87c94295b90aded969cc9c
                                                • Instruction ID: d046deeca5c90afedf59c3c2adf6e577c98fc09c0d523a38f3b7b8c8d7ec895b
                                                • Opcode Fuzzy Hash: 37899cfd718ec703756e9818332733efa08b8ab25d87c94295b90aded969cc9c
                                                • Instruction Fuzzy Hash: 42D13071608601DFC714DF24C484A6EBBE6EF89B14F14885DF88A9B362DB31ED45CB92
                                                APIs
                                                  • Part of subcall function 00120FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00120FCA
                                                  • Part of subcall function 00120FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00120FD6
                                                  • Part of subcall function 00120FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00120FE5
                                                  • Part of subcall function 00120FB4: RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 00120FEC
                                                  • Part of subcall function 00120FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00121002
                                                • GetLengthSid.ADVAPI32(?,00000000,00121335), ref: 001217AE
                                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 001217BA
                                                • RtlAllocateHeap.NTDLL(00000000), ref: 001217C1
                                                • CopySid.ADVAPI32(00000000,00000000,?), ref: 001217DA
                                                • GetProcessHeap.KERNEL32(00000000,00000000,00121335), ref: 001217EE
                                                • HeapFree.KERNEL32(00000000), ref: 001217F5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocateInformationToken$CopyErrorFreeLastLength
                                                • String ID:
                                                • API String ID: 169236558-0
                                                • Opcode ID: c04f5c9b13312f08b4d3a402fbbac83fe7326c350e97db0d274652ca4fabc9cc
                                                • Instruction ID: 0c5800aaaefb06f968b2cb46d916b8a7412ab1525de1c3831444a0ea47b257d5
                                                • Opcode Fuzzy Hash: c04f5c9b13312f08b4d3a402fbbac83fe7326c350e97db0d274652ca4fabc9cc
                                                • Instruction Fuzzy Hash: 8611BE32500715FFDB10DFA4EC89BAF7BA9EB95356F104018F4419B211D735A990CBA0
                                                APIs
                                                • GetLastError.KERNEL32(?,?,000E3379,000E2FE5), ref: 000E3390
                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 000E339E
                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 000E33B7
                                                • SetLastError.KERNEL32(00000000,?,000E3379,000E2FE5), ref: 000E3409
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorLastValue___vcrt_
                                                • String ID:
                                                • API String ID: 3852720340-0
                                                • Opcode ID: bc5969bffdea15a252fd918b92677569509e45cecad89dcd845bd58eae17c418
                                                • Instruction ID: 0bc8454ad8873f3bae8e458ed4395308fd4058566c977cf5ac6c9872a72d0b1f
                                                • Opcode Fuzzy Hash: bc5969bffdea15a252fd918b92677569509e45cecad89dcd845bd58eae17c418
                                                • Instruction Fuzzy Hash: 8E016832208351BFA76627777C8D9AA2FD4EB003B9330422AF110B31F2EF210F4156A0
                                                APIs
                                                • GetLastError.KERNEL32(?,?,000F5686,00103CD6,?,00000000,?,000F5B6A,?,?,?,?,?,000EE6D1,?,00188A48), ref: 000F2D78
                                                • _free.LIBCMT ref: 000F2DAB
                                                • _free.LIBCMT ref: 000F2DD3
                                                • SetLastError.KERNEL32(00000000,?,?,?,?,000EE6D1,?,00188A48,00000010,000C4F4A,?,?,00000000,00103CD6), ref: 000F2DE0
                                                • SetLastError.KERNEL32(00000000,?,?,?,?,000EE6D1,?,00188A48,00000010,000C4F4A,?,?,00000000,00103CD6), ref: 000F2DEC
                                                • _abort.LIBCMT ref: 000F2DF2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_free$_abort
                                                • String ID:
                                                • API String ID: 3160817290-0
                                                • Opcode ID: 7384b7a6d7e61fa1d8e66b92adfa2f16337979cfdd45b4b5ab7188c9e98fba23
                                                • Instruction ID: 150b754d0c2b868b899910d3c637a7b2aa0368bdd56779b048cdda8f8ad00414
                                                • Opcode Fuzzy Hash: 7384b7a6d7e61fa1d8e66b92adfa2f16337979cfdd45b4b5ab7188c9e98fba23
                                                • Instruction Fuzzy Hash: ECF02831545B0C6BC2A22734BC0AEBF2599BFC17B1F210019FB2496DE3EF34894171A0
                                                APIs
                                                  • Part of subcall function 000D9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 000D9693
                                                  • Part of subcall function 000D9639: SelectObject.GDI32(?,00000000), ref: 000D96A2
                                                  • Part of subcall function 000D9639: BeginPath.GDI32(?), ref: 000D96B9
                                                  • Part of subcall function 000D9639: SelectObject.GDI32(?,00000000), ref: 000D96E2
                                                • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00158A4E
                                                • LineTo.GDI32(?,00000003,00000000), ref: 00158A62
                                                • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00158A70
                                                • LineTo.GDI32(?,00000000,00000003), ref: 00158A80
                                                • EndPath.GDI32(?), ref: 00158A90
                                                • StrokePath.GDI32(?), ref: 00158AA0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                • String ID:
                                                • API String ID: 43455801-0
                                                • Opcode ID: 0a436127f96b2605cd492b6ea63efb7475c20d536123c269ef515d3d8348eb01
                                                • Instruction ID: 00fc4ea27f3dd2740896ec9ff000e6c8f6033f9ecdf4bc16844f7ba07392d7fb
                                                • Opcode Fuzzy Hash: 0a436127f96b2605cd492b6ea63efb7475c20d536123c269ef515d3d8348eb01
                                                • Instruction Fuzzy Hash: 4B11DB7600024DFFDF129F94DC88EAA7F6DEB08395F048012BA199A5A1C7729D95DFA0
                                                APIs
                                                • GetDC.USER32(00000000), ref: 00125218
                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 00125229
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00125230
                                                • ReleaseDC.USER32(00000000,00000000), ref: 00125238
                                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0012524F
                                                • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00125261
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CapsDevice$Release
                                                • String ID:
                                                • API String ID: 1035833867-0
                                                • Opcode ID: 0e3d60ab88a7e83b1d90d89dae25d6986ba8201ffe02f3d95925257107060d25
                                                • Instruction ID: 50f7f041a162a1b02f2db3579a4a5a281bcd9e85fdfde33cb3c28032558eb89b
                                                • Opcode Fuzzy Hash: 0e3d60ab88a7e83b1d90d89dae25d6986ba8201ffe02f3d95925257107060d25
                                                • Instruction Fuzzy Hash: 7C018F75A00718FFEB109FA59C49A4EBFB8EB48752F044065FA04AB281D6709900CBA0
                                                APIs
                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 000C1BF4
                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 000C1BFC
                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 000C1C07
                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 000C1C12
                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 000C1C1A
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 000C1C22
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Virtual
                                                • String ID:
                                                • API String ID: 4278518827-0
                                                • Opcode ID: 8899023dfc6eaa812f40f6bc09d7b9cbb1a888a27505193debebbfaaf8cbc333
                                                • Instruction ID: 24a0b788c56c8f607e7fe5927ad736ab38ce076df7499988714f3e419d6a958d
                                                • Opcode Fuzzy Hash: 8899023dfc6eaa812f40f6bc09d7b9cbb1a888a27505193debebbfaaf8cbc333
                                                • Instruction Fuzzy Hash: C1016CB0902759BDE3008F5A8C85B52FFA8FF19354F00411B915C4BA41C7F5A864CBE5
                                                APIs
                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0012EB30
                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0012EB46
                                                • GetWindowThreadProcessId.USER32(?,?), ref: 0012EB55
                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0012EB64
                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0012EB6E
                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0012EB75
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                • String ID:
                                                • API String ID: 839392675-0
                                                • Opcode ID: 939b7ab0e6cbf075eba6949563a99f8706e189720721c2195e6bf9c0ca4d04fb
                                                • Instruction ID: a4de9333d34ae4e3cf74faf7a81af609adaad912c65964c5bf23abb522290253
                                                • Opcode Fuzzy Hash: 939b7ab0e6cbf075eba6949563a99f8706e189720721c2195e6bf9c0ca4d04fb
                                                • Instruction Fuzzy Hash: 0BF01772240758FFE6215B629C0EEEB3A7CEBCAB12F000158F601D9591A7A05A818AF5
                                                APIs
                                                • GetClientRect.USER32(?), ref: 00117452
                                                • SendMessageW.USER32(?,00001328,00000000,?), ref: 00117469
                                                • GetWindowDC.USER32(?), ref: 00117475
                                                • GetPixel.GDI32(00000000,?,?), ref: 00117484
                                                • ReleaseDC.USER32(?,00000000), ref: 00117496
                                                • GetSysColor.USER32(00000005), ref: 001174B0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                • String ID:
                                                • API String ID: 272304278-0
                                                • Opcode ID: 5d39f3a99d55e5a3c6ec3837a32640e4e9e2f99a41f5c0d112b079de120a3476
                                                • Instruction ID: 2e66e3ffda473d64fcd95e5628be9af3fe26f58d6b972957a901cd93f3a7c0c2
                                                • Opcode Fuzzy Hash: 5d39f3a99d55e5a3c6ec3837a32640e4e9e2f99a41f5c0d112b079de120a3476
                                                • Instruction Fuzzy Hash: 4C014B31500315FFEB515FA4DC48BEABBB6FB04322F510164F916A7AA1CB311E91EB90
                                                APIs
                                                  • Part of subcall function 000C7620: _wcslen.LIBCMT ref: 000C7625
                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0012C6EE
                                                • _wcslen.LIBCMT ref: 0012C735
                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0012C79C
                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0012C7CA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info_wcslen$Default
                                                • String ID: 0
                                                • API String ID: 1227352736-4108050209
                                                • Opcode ID: 91e84cc5455b3b533b7e790be22ed93dc7c651103e536955adb046512a11d0d6
                                                • Instruction ID: 10c18c4ea0c7169c71e02e6a9d18c5b5c5b16817a4b3233b83832011ba50ed38
                                                • Opcode Fuzzy Hash: 91e84cc5455b3b533b7e790be22ed93dc7c651103e536955adb046512a11d0d6
                                                • Instruction Fuzzy Hash: AB51F1716043219BD7149F28E884BAF77E8AF49314F040A2DFA95E3291DB70DD64CBD2
                                                APIs
                                                • ShellExecuteExW.SHELL32(0000003C), ref: 0014AEA3
                                                  • Part of subcall function 000C7620: _wcslen.LIBCMT ref: 000C7625
                                                • GetProcessId.KERNEL32(00000000), ref: 0014AF38
                                                • CloseHandle.KERNEL32(00000000), ref: 0014AF67
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CloseExecuteHandleProcessShell_wcslen
                                                • String ID: <$@
                                                • API String ID: 146682121-1426351568
                                                • Opcode ID: 44f266dccd23c4bfa26b03adb69752baf2556c3debbdcb407808ab85a6c40de5
                                                • Instruction ID: 4df0c0bd07eb5199abf6723ce891d0f79aed648646556e079d7c9c484ac3a949
                                                • Opcode Fuzzy Hash: 44f266dccd23c4bfa26b03adb69752baf2556c3debbdcb407808ab85a6c40de5
                                                • Instruction Fuzzy Hash: 55713671A00619DFCB14DFA4C494A9EBBF0BF08314F458499E85AAB3A2CB74ED45CB91
                                                APIs
                                                • CoCreateInstance.COMBASE(?,00000000,00000005,?,?), ref: 00127206
                                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0012723C
                                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0012724D
                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 001272CF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorMode$AddressCreateInstanceProc
                                                • String ID: DllGetClassObject
                                                • API String ID: 753597075-1075368562
                                                • Opcode ID: 4c7d089a5a43afb730991e3d03fca9889e427647f05770959e7ed69fa644129e
                                                • Instruction ID: ea06b45cceb865e3fcc751193150c9aa5a36d6fcaaf98972d9639ec9bf0ad0c6
                                                • Opcode Fuzzy Hash: 4c7d089a5a43afb730991e3d03fca9889e427647f05770959e7ed69fa644129e
                                                • Instruction Fuzzy Hash: 2F418D71A04314EFDB15DF94D884A9B7BA9EF44310F1580ADFD059F28AD7B0DA54CBA0
                                                APIs
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00153E35
                                                • IsMenu.USER32(?), ref: 00153E4A
                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00153E92
                                                • DrawMenuBar.USER32 ref: 00153EA5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Menu$Item$DrawInfoInsert
                                                • String ID: 0
                                                • API String ID: 3076010158-4108050209
                                                • Opcode ID: 02c9707213547990d139bce0d474604eb65136777bb78c4fa628e9b78e1877b9
                                                • Instruction ID: 355f451538e805bcef36b6b3d8ed9b624f86abd859623a73a440746569fc543d
                                                • Opcode Fuzzy Hash: 02c9707213547990d139bce0d474604eb65136777bb78c4fa628e9b78e1877b9
                                                • Instruction Fuzzy Hash: 4E414B75A00209EFDB10DF90D885ADAB7F5FF45395F044119ED259B250D770AE49CF60
                                                APIs
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                  • Part of subcall function 00123CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00123CCA
                                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00121E66
                                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00121E79
                                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 00121EA9
                                                  • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$_wcslen$ClassName
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 2081771294-1403004172
                                                • Opcode ID: c459a43a46a174410279003c89344ed2fe44d6e6f41a9c07060f86c9e783784d
                                                • Instruction ID: 0dfe07e80e0a6f97bc40a34681ee27f0abeb09d656032219bad99f8529e5816e
                                                • Opcode Fuzzy Hash: c459a43a46a174410279003c89344ed2fe44d6e6f41a9c07060f86c9e783784d
                                                • Instruction Fuzzy Hash: 97213771A00204BEDB15EF64EC46DFFB7B9DF51350B104129F825A72E1DB344E198660
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                • API String ID: 176396367-4004644295
                                                • Opcode ID: 55fe8f7d5b6ca293464762affc0e4945aa5b2ea56946de9b4b9f99844b7b0db8
                                                • Instruction ID: 3ea5419ebb44ce23e9c79e378191bd55300aed54686436b86c29ebf566e653eb
                                                • Opcode Fuzzy Hash: 55fe8f7d5b6ca293464762affc0e4945aa5b2ea56946de9b4b9f99844b7b0db8
                                                • Instruction Fuzzy Hash: 1D313A73A0216A4BCB60EF2CC9405BF33915BA1750B754029E841BB3A5FB71CE84D7E0
                                                APIs
                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00152F8D
                                                • LoadLibraryW.KERNEL32(?), ref: 00152F94
                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00152FA9
                                                • DestroyWindow.USER32(?), ref: 00152FB1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$DestroyLibraryLoadWindow
                                                • String ID: SysAnimate32
                                                • API String ID: 3529120543-1011021900
                                                • Opcode ID: 122bd3a2a809ea87c891ee54c3af20e8a154fd758d893b3536095fde197c2b4d
                                                • Instruction ID: 389de86050da0f9a3bca4032f24ae50f2ec102d12e73f85930583d50dc92c913
                                                • Opcode Fuzzy Hash: 122bd3a2a809ea87c891ee54c3af20e8a154fd758d893b3536095fde197c2b4d
                                                • Instruction Fuzzy Hash: BD218C72204205EFEB104F64EC80FBB77B9EB5A366F10461AFD60EA190D771DC959BA0
                                                APIs
                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,000E4D1E,000F28E9,?,000E4CBE,000F28E9,001888B8,0000000C,000E4E15,000F28E9,00000002), ref: 000E4D8D
                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 000E4DA0
                                                • FreeLibrary.KERNEL32(00000000,?,?,?,000E4D1E,000F28E9,?,000E4CBE,000F28E9,001888B8,0000000C,000E4E15,000F28E9,00000002,00000000), ref: 000E4DC3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 815151d89a7262a063c734d64d7b94252e95c97a0a8e65b41e7edd5e962f6314
                                                • Instruction ID: ee8fab756560f035d0085d820fefc488cd6f3517e21776bdb18887f96e6e5a0c
                                                • Opcode Fuzzy Hash: 815151d89a7262a063c734d64d7b94252e95c97a0a8e65b41e7edd5e962f6314
                                                • Instruction Fuzzy Hash: F5F03C35A40308EFDB519F95DC49BEEBBE5EB44752F0400A8B805A6660CB705A90CBD1
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?,000C4EDD,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4E9C
                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 000C4EAE
                                                • FreeLibrary.KERNEL32(00000000,?,?,000C4EDD,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4EC0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Library$AddressFreeLoadProc
                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                • API String ID: 145871493-3689287502
                                                • Opcode ID: a0f85571bacb0a5e79c359c664a37c3faca91c8b3935156194439a4a1bf8f02f
                                                • Instruction ID: e3f24cfd7a567f062b6165b5c94018558f3d86b975c2117652ee9631353ce635
                                                • Opcode Fuzzy Hash: a0f85571bacb0a5e79c359c664a37c3faca91c8b3935156194439a4a1bf8f02f
                                                • Instruction Fuzzy Hash: F8E08635A01B22DFD2611F256C68F5F6694BF81F637060119FC00E6500DB60CD4185E0
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00103CDE,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4E62
                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 000C4E74
                                                • FreeLibrary.KERNEL32(00000000,?,?,00103CDE,?,00191418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 000C4E87
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Library$AddressFreeLoadProc
                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                • API String ID: 145871493-1355242751
                                                • Opcode ID: e1054590682e83da9de697bd410757d6d10383af70c5c25bfc9033345f443d6c
                                                • Instruction ID: 10aa7ec4febd8ac90c766e34783451489792b0b410ce4231648e2aa4bf08586d
                                                • Opcode Fuzzy Hash: e1054590682e83da9de697bd410757d6d10383af70c5c25bfc9033345f443d6c
                                                • Instruction Fuzzy Hash: 2FD01235502B21DF96621F297C28ECF6A58BF85F523060519BD05AA555CF60CE41C5D0
                                                APIs
                                                • GetCurrentProcessId.KERNEL32 ref: 0014A427
                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0014A435
                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0014A468
                                                • CloseHandle.KERNEL32(?), ref: 0014A63D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Process$CloseCountersCurrentHandleOpen
                                                • String ID:
                                                • API String ID: 3488606520-0
                                                • Opcode ID: 980696fee564cedd1d16edd53bc4a2039d19182f3771c741146350fc77de4b27
                                                • Instruction ID: f99fbc2fe9efdee113bdb5f00376c049d9cc25e82fa84a770bcb8736d2113944
                                                • Opcode Fuzzy Hash: 980696fee564cedd1d16edd53bc4a2039d19182f3771c741146350fc77de4b27
                                                • Instruction Fuzzy Hash: A6A1B0716043019FE720DF24C886F6AB7E5AF84714F55881DF59A9B3D2D7B0EC418B92
                                                APIs
                                                  • Part of subcall function 00143149: select.WS2_32(00000000,?,00000000,00000000,?), ref: 00143195
                                                • __WSAFDIsSet.WS2_32(00000000,?), ref: 00141DC0
                                                • WSAGetLastError.WS2_32 ref: 00141DF2
                                                • inet_ntoa.WS2_32(?), ref: 00141E8C
                                                • htons.WS2_32(?), ref: 00141EDB
                                                • _strlen.LIBCMT ref: 00141F35
                                                  • Part of subcall function 001239E8: _strlen.LIBCMT ref: 001239F2
                                                  • Part of subcall function 000C6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,000DCF58,?,?,?), ref: 000C6DBA
                                                  • Part of subcall function 000C6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,000DCF58,?,?,?), ref: 000C6DED
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                • String ID:
                                                • API String ID: 1923757996-0
                                                • Opcode ID: c8d2d34eed00a35a399bf88c6c3630d4052802ca7c0687b4622b397603eb3919
                                                • Instruction ID: d915866c5e3be728bcbbd534ac675965cb461aa5af219c75bb05486ab4885274
                                                • Opcode Fuzzy Hash: c8d2d34eed00a35a399bf88c6c3630d4052802ca7c0687b4622b397603eb3919
                                                • Instruction Fuzzy Hash: 66A1CE71604340AFC324DF20C895F6A7BA5AF94318F94895CF45A5B2A3CB31ED8ACB91
                                                APIs
                                                  • Part of subcall function 0012DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0012CF22,?), ref: 0012DDFD
                                                  • Part of subcall function 0012DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0012CF22,?), ref: 0012DE16
                                                  • Part of subcall function 0012E199: GetFileAttributesW.KERNEL32(?,0012CF95), ref: 0012E19A
                                                • lstrcmpiW.KERNEL32(?,?), ref: 0012E473
                                                • MoveFileW.KERNEL32(?,?), ref: 0012E4AC
                                                • _wcslen.LIBCMT ref: 0012E5EB
                                                • _wcslen.LIBCMT ref: 0012E603
                                                • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0012E650
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                • String ID:
                                                • API String ID: 3183298772-0
                                                • Opcode ID: 522229b97f71d59972e4dc9e27ec87ceff1132d0c325f4078afacd60064ebf14
                                                • Instruction ID: 670af0b42a38d6db6e55823b4b6b851082972b6aaa35de19fcf1f3204b2912ba
                                                • Opcode Fuzzy Hash: 522229b97f71d59972e4dc9e27ec87ceff1132d0c325f4078afacd60064ebf14
                                                • Instruction Fuzzy Hash: F95153B24083959FC724EB90EC819DF73DCAF95340F40492EF689D3192EF74A6988766
                                                APIs
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                  • Part of subcall function 0014C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0014B6AE,?,?), ref: 0014C9B5
                                                  • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014C9F1
                                                  • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA68
                                                  • Part of subcall function 0014C998: _wcslen.LIBCMT ref: 0014CA9E
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0014BAA5
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0014BB00
                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0014BB63
                                                • RegCloseKey.ADVAPI32(?,?), ref: 0014BBA6
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0014BBB3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                • String ID:
                                                • API String ID: 826366716-0
                                                • Opcode ID: e5e77795be80a398772c3bd24a69301680a47c232fedc38912fbd8bccac7a33b
                                                • Instruction ID: d28b93e3856744dc8ddb514ac532dc78a94645030a000818810e23ca1668c88b
                                                • Opcode Fuzzy Hash: e5e77795be80a398772c3bd24a69301680a47c232fedc38912fbd8bccac7a33b
                                                • Instruction Fuzzy Hash: 4B616C31208241AFD714DF24C8D5E6ABBE5FF84318F54899CF4998B2A2DB31ED45CB92
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 00128BCD
                                                • VariantClear.OLEAUT32 ref: 00128C3E
                                                • VariantClear.OLEAUT32 ref: 00128C9D
                                                • VariantClear.OLEAUT32(?), ref: 00128D10
                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00128D3B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Variant$Clear$ChangeInitType
                                                • String ID:
                                                • API String ID: 4136290138-0
                                                • Opcode ID: 2b7a0d1c284677a059128f1ec9754c952fc3cc41060e95628d60e34986fc2dfa
                                                • Instruction ID: a05c221047df2524d7e3b8a689dbfde00f8671fcdfdbebaa09b2d03f9f842889
                                                • Opcode Fuzzy Hash: 2b7a0d1c284677a059128f1ec9754c952fc3cc41060e95628d60e34986fc2dfa
                                                • Instruction Fuzzy Hash: 855159B5A01219EFDB14CF68D894EAAB7F8FF89310B158559E905DB350E730E921CFA0
                                                APIs
                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00138BAE
                                                • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00138BDA
                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00138C32
                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00138C57
                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00138C5F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: PrivateProfile$SectionWrite$String
                                                • String ID:
                                                • API String ID: 2832842796-0
                                                • Opcode ID: eeb1d34b9625e573f7b80e7a84d8502ed8a64722d523a85eaf4e7dac9538adb0
                                                • Instruction ID: a1c345138d0aa051060291fe18ed7df0b694408a280f62cd068ea280c806e836
                                                • Opcode Fuzzy Hash: eeb1d34b9625e573f7b80e7a84d8502ed8a64722d523a85eaf4e7dac9538adb0
                                                • Instruction Fuzzy Hash: DC511835A006159FCB05DF64C881EADBBF5FF48314F088459E849AB362DB35ED51DBA0
                                                APIs
                                                • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00148F40
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00148FD0
                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00148FEC
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00149032
                                                • FreeLibrary.KERNEL32(00000000), ref: 00149052
                                                  • Part of subcall function 000DF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00131043,?,753CE610), ref: 000DF6E6
                                                  • Part of subcall function 000DF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0011FA64,00000000,00000000,?,?,00131043,?,753CE610,?,0011FA64), ref: 000DF70D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                • String ID:
                                                • API String ID: 666041331-0
                                                • Opcode ID: 51b532090521942c7f5c9ea0494c39ae2021dd0edd3a334cebb8482d76acf02d
                                                • Instruction ID: c40585d05bbe82e99b2ebfff2a120ce69578a4861bfc7eee649297b62c074f15
                                                • Opcode Fuzzy Hash: 51b532090521942c7f5c9ea0494c39ae2021dd0edd3a334cebb8482d76acf02d
                                                • Instruction Fuzzy Hash: 3B513635600605DFCB15DF68C494DADBBF1FF49324B4580A9E80A9B762DB31ED89CB90
                                                APIs
                                                • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00156C33
                                                • SetWindowLongW.USER32(?,000000EC,?), ref: 00156C4A
                                                • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00156C73
                                                • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0013AB79,00000000,00000000), ref: 00156C98
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00156CC7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$Long$MessageSendShow
                                                • String ID:
                                                • API String ID: 3688381893-0
                                                • Opcode ID: 9c2bae1bad8bc8f710dc28544e4ca507d0099e89715370da3a8783a06a176be9
                                                • Instruction ID: b946714aeeb8eb5d3fc5feb23ee2e71c4033abe0697561862a49708655c759aa
                                                • Opcode Fuzzy Hash: 9c2bae1bad8bc8f710dc28544e4ca507d0099e89715370da3a8783a06a176be9
                                                • Instruction Fuzzy Hash: AC41D635604204EFD724CF28CC55FA97BA5EB09361F950228FCA9AF2E1C371AD85DAC0
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: 8a38d205a4ba14fcc708b70e68c6899bef41228852cec66a3358327d66d37c5a
                                                • Instruction ID: 58d14d93d475f18a91d2218ef85c13c0c2854fdf3489ffec56b43c1737b91eaa
                                                • Opcode Fuzzy Hash: 8a38d205a4ba14fcc708b70e68c6899bef41228852cec66a3358327d66d37c5a
                                                • Instruction Fuzzy Hash: 1741D332A003089FCB24DF78C881AADB7F5EF89314F154569E615EB792DB31AD01DB90
                                                APIs
                                                • GetCursorPos.USER32(?), ref: 000D9141
                                                • ScreenToClient.USER32(00000000,?), ref: 000D915E
                                                • GetAsyncKeyState.USER32(00000001), ref: 000D9183
                                                • GetAsyncKeyState.USER32(00000002), ref: 000D919D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: AsyncState$ClientCursorScreen
                                                • String ID:
                                                • API String ID: 4210589936-0
                                                • Opcode ID: d60dfc8047f65869632cac979d2193073a116ab4b933ac3433ff6811a9153a6a
                                                • Instruction ID: 53df3745ed2c6a9a411ca68c8ca088ac6858aebfe65eaf59ca1e272333caf9b9
                                                • Opcode Fuzzy Hash: d60dfc8047f65869632cac979d2193073a116ab4b933ac3433ff6811a9153a6a
                                                • Instruction Fuzzy Hash: 3D416075A0860AFBDF199F64C844BEEB774FF05320F208226E825A73D0C7346994CBA1
                                                APIs
                                                • GetInputState.USER32 ref: 001338CB
                                                • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00133922
                                                • TranslateMessage.USER32(?), ref: 0013394B
                                                • DispatchMessageW.USER32(?), ref: 00133955
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00133966
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                • String ID:
                                                • API String ID: 2256411358-0
                                                • Opcode ID: 5e6049affda6fdfce261c52e28f3429419d34348fdf011dd35d90bb8a4253c67
                                                • Instruction ID: 04172ca386666c26980e0d17df44222cfbceabf9c95cc5de7649ca78abe69b96
                                                • Opcode Fuzzy Hash: 5e6049affda6fdfce261c52e28f3429419d34348fdf011dd35d90bb8a4253c67
                                                • Instruction Fuzzy Hash: 7931D570904342EEEF35CB34D849BB637A8EB05308F04056EE472C65A0E3B49AC5CB55
                                                APIs
                                                • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0013C21E,00000000), ref: 0013CF38
                                                • InternetReadFile.WININET(?,00000000,?,?), ref: 0013CF6F
                                                • GetLastError.KERNEL32(?,00000000,?,?,?,0013C21E,00000000), ref: 0013CFB4
                                                • SetEvent.KERNEL32(?,?,00000000,?,?,?,0013C21E,00000000), ref: 0013CFC8
                                                • SetEvent.KERNEL32(?,?,00000000,?,?,?,0013C21E,00000000), ref: 0013CFF2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                • String ID:
                                                • API String ID: 3191363074-0
                                                • Opcode ID: ee9fb0d9fd9e1859c408ef7e737433daa9e9f4686ac987671318f0c49c279cf6
                                                • Instruction ID: 09c3423ced454979a1c7cebd99538ac42e6bfac94cf85d9ac496ba870c6b7951
                                                • Opcode Fuzzy Hash: ee9fb0d9fd9e1859c408ef7e737433daa9e9f4686ac987671318f0c49c279cf6
                                                • Instruction Fuzzy Hash: 0B316B71500306EFDB24DFA5C8849ABBBFEEB14311F10842EF506E6601DB30AE41DBA0
                                                APIs
                                                • GetWindowRect.USER32(?,?), ref: 00121915
                                                • PostMessageW.USER32(00000001,00000201,00000001), ref: 001219C1
                                                • Sleep.KERNEL32(00000000,?,?,?), ref: 001219C9
                                                • PostMessageW.USER32(00000001,00000202,00000000), ref: 001219DA
                                                • Sleep.KERNEL32(00000000,?,?,?,?), ref: 001219E2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessagePostSleep$RectWindow
                                                • String ID:
                                                • API String ID: 3382505437-0
                                                • Opcode ID: 55efd2e95ace8a38d1163678509c86f997f0a1a21089592b9756659a9b7dafb9
                                                • Instruction ID: c4eb4a62ed7d3f2ca8df01691fa29870492f848b3abe73891cb462da83a180d6
                                                • Opcode Fuzzy Hash: 55efd2e95ace8a38d1163678509c86f997f0a1a21089592b9756659a9b7dafb9
                                                • Instruction Fuzzy Hash: D8319171900229EFCF14CFA8DD99ADE7BB5EB54319F104225F921AB2D1C7709A94CB90
                                                APIs
                                                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00155745
                                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 0015579D
                                                • _wcslen.LIBCMT ref: 001557AF
                                                • _wcslen.LIBCMT ref: 001557BA
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00155816
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$_wcslen
                                                • String ID:
                                                • API String ID: 763830540-0
                                                • Opcode ID: 287d5e540b0b55b35a3de3da4ef5baaa42a432434abb5470be66161fd6903639
                                                • Instruction ID: 69c276bc6b3ffa90c51adbb7d1870a5ccd85534d926c82de883d01fbe27c08d6
                                                • Opcode Fuzzy Hash: 287d5e540b0b55b35a3de3da4ef5baaa42a432434abb5470be66161fd6903639
                                                • Instruction Fuzzy Hash: FB218571904618DADB209FA1CC85AED7BB9FF04726F108256ED39EE181E7708AC9CF50
                                                APIs
                                                • IsWindow.USER32(00000000), ref: 00140951
                                                • GetForegroundWindow.USER32 ref: 00140968
                                                • GetDC.USER32(00000000), ref: 001409A4
                                                • GetPixel.GDI32(00000000,?,00000003), ref: 001409B0
                                                • ReleaseDC.USER32(00000000,00000003), ref: 001409E8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$ForegroundPixelRelease
                                                • String ID:
                                                • API String ID: 4156661090-0
                                                • Opcode ID: 0b768fc180a0dda05982502756395fe805cc073c7af47fd69e114b194e2cc5e5
                                                • Instruction ID: 3ae7095384eaa390a5e445eaf1e722d5e75475223cbd48a82212d09b6bbb2410
                                                • Opcode Fuzzy Hash: 0b768fc180a0dda05982502756395fe805cc073c7af47fd69e114b194e2cc5e5
                                                • Instruction Fuzzy Hash: 1F216D35600214EFD704EF65C885AAEBBE9EF58701F04846CF84A9B762CB30AD44CB90
                                                APIs
                                                • GetEnvironmentStringsW.KERNEL32 ref: 000FCDC6
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 000FCDE9
                                                  • Part of subcall function 000F3820: RtlAllocateHeap.NTDLL(00000000,?,00191444), ref: 000F3852
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 000FCE0F
                                                • _free.LIBCMT ref: 000FCE22
                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 000FCE31
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                • String ID:
                                                • API String ID: 336800556-0
                                                • Opcode ID: 129ce3d3142454bae41996a5b0f83150edbe35a1f94bdf442cc4c534a3d591ae
                                                • Instruction ID: 88b53ea378201cdbf88c493156b1c0ab93c8abd9dec09650e4ce2ad4cb158033
                                                • Opcode Fuzzy Hash: 129ce3d3142454bae41996a5b0f83150edbe35a1f94bdf442cc4c534a3d591ae
                                                • Instruction Fuzzy Hash: 22018872A0171DBF33611A7A6D89DBF79ADEFC6BA13150129FA05C7901DA618D01A1F0
                                                APIs
                                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 000D9693
                                                • SelectObject.GDI32(?,00000000), ref: 000D96A2
                                                • BeginPath.GDI32(?), ref: 000D96B9
                                                • SelectObject.GDI32(?,00000000), ref: 000D96E2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ObjectSelect$BeginCreatePath
                                                • String ID:
                                                • API String ID: 3225163088-0
                                                • Opcode ID: 2af06f765c6ea15dd036ba1eaef09794f3ec9068fc894614f94e30ddfa0e1066
                                                • Instruction ID: 71d228909d3141b82fdb6e57ed2ced9a99ff6276c34a96134a3b468ac6123681
                                                • Opcode Fuzzy Hash: 2af06f765c6ea15dd036ba1eaef09794f3ec9068fc894614f94e30ddfa0e1066
                                                • Instruction Fuzzy Hash: 46214970802306EFDB119F65EC58BAD7BB9BB5036AF104217F821A66E0D37098D1CBA4
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _memcmp
                                                • String ID:
                                                • API String ID: 2931989736-0
                                                • Opcode ID: bc4aa5fc11381d476c3281bc8537a37f5b29bd164323ab1d10a3f333eea4e0d3
                                                • Instruction ID: a93867109d4f359e6f402fc2f314eecba62263871b11e45c30515c2d86bfa2ce
                                                • Opcode Fuzzy Hash: bc4aa5fc11381d476c3281bc8537a37f5b29bd164323ab1d10a3f333eea4e0d3
                                                • Instruction Fuzzy Hash: 4201B971681655FFD3089621ADC2FFB735E9B613A5F804034FD14AE242F770EE2582A0
                                                APIs
                                                • GetLastError.KERNEL32(?,?,?,000EF2DE,000F3863,00191444,?,000DFDF5,?,?,000CA976,00000010,00191440,000C13FC,?,000C13C6), ref: 000F2DFD
                                                • _free.LIBCMT ref: 000F2E32
                                                • _free.LIBCMT ref: 000F2E59
                                                • SetLastError.KERNEL32(00000000,000C1129), ref: 000F2E66
                                                • SetLastError.KERNEL32(00000000,000C1129), ref: 000F2E6F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_free
                                                • String ID:
                                                • API String ID: 3170660625-0
                                                • Opcode ID: 2d69712bb4029901d929c257c03a008b1808b5b493d03e9f2a332572cc30bb6b
                                                • Instruction ID: 6e327fe2f3dcbefe30cbb0c482653443496252a69aaf12251ab7ad601b16c44a
                                                • Opcode Fuzzy Hash: 2d69712bb4029901d929c257c03a008b1808b5b493d03e9f2a332572cc30bb6b
                                                • Instruction Fuzzy Hash: 6701F932245B0CABC65267746C45D7F2999BBD17717310025FB2193E93EB708D417160
                                                APIs
                                                • CLSIDFromProgID.COMBASE ref: 0012002B
                                                • ProgIDFromCLSID.COMBASE(?,00000000), ref: 00120046
                                                • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0011FF41,80070057,?,?), ref: 00120054
                                                • CoTaskMemFree.COMBASE(00000000), ref: 00120064
                                                • CLSIDFromString.COMBASE(?,?), ref: 00120070
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                • String ID:
                                                • API String ID: 3897988419-0
                                                • Opcode ID: 638b3fe3b8cd6a7fdc8ced83bce8677b32c5fa4bdb983c2c7406482715991aa1
                                                • Instruction ID: a1ecdaa1c54751f66b64a71ac297b3c2fa697e974267ba801a29feb8036a8b77
                                                • Opcode Fuzzy Hash: 638b3fe3b8cd6a7fdc8ced83bce8677b32c5fa4bdb983c2c7406482715991aa1
                                                • Instruction Fuzzy Hash: 5201A772600314FFEB114F64EC44BAA7AEDEF48792F144214F905D6221D771DD5087A4
                                                APIs
                                                • QueryPerformanceCounter.KERNEL32(?), ref: 0012E997
                                                • QueryPerformanceFrequency.KERNEL32(?), ref: 0012E9A5
                                                • Sleep.KERNEL32(00000000), ref: 0012E9AD
                                                • QueryPerformanceCounter.KERNEL32(?), ref: 0012E9B7
                                                • Sleep.KERNEL32 ref: 0012E9F3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                • String ID:
                                                • API String ID: 2833360925-0
                                                • Opcode ID: 5722cfd8e1770e25627ec113d6ff09b00caf4f03cb4d30986c5d789fae415ad1
                                                • Instruction ID: 7e696ec471462dfb12bf3799b62137f7ab2d2f4082337ff6a3991765756c4a7d
                                                • Opcode Fuzzy Hash: 5722cfd8e1770e25627ec113d6ff09b00caf4f03cb4d30986c5d789fae415ad1
                                                • Instruction Fuzzy Hash: 41011731C01A39DBCF00AFE5E899AEDBBB8BB09705F010556E502B2241CB3495A4CBA1
                                                APIs
                                                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00121114
                                                • GetLastError.KERNEL32(?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 00121120
                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00120B9B,?,?,?), ref: 0012112F
                                                • RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 00121136
                                                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0012114D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: HeapObjectSecurityUser$AllocateErrorLastProcess
                                                • String ID:
                                                • API String ID: 883493501-0
                                                • Opcode ID: 1e87e32831bbcc18d5c7d10a1cc3a9ef4ec96ec3fdd70a9ad90af60ffcb91f25
                                                • Instruction ID: 6dc3499f66fdeb4a483e2d32bb9ed5e1c05717da8b5a265f3a481bbd5214dee2
                                                • Opcode Fuzzy Hash: 1e87e32831bbcc18d5c7d10a1cc3a9ef4ec96ec3fdd70a9ad90af60ffcb91f25
                                                • Instruction Fuzzy Hash: 21016D79100315FFDB114F64EC49A6A3F6EEF89361B140414FA41D7350DB31DC50CAA0
                                                APIs
                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00120FCA
                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00120FD6
                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00120FE5
                                                • RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 00120FEC
                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00121002
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: HeapInformationToken$AllocateErrorLastProcess
                                                • String ID:
                                                • API String ID: 47921759-0
                                                • Opcode ID: 7a5c5489eca32673e393974af274d1c48aed29d375b5ecd38dc37a7b758cabb2
                                                • Instruction ID: ae8e797b54ed9d018ad681d0893b3e53d6a99649b88dd89e95091f0c9049a9ad
                                                • Opcode Fuzzy Hash: 7a5c5489eca32673e393974af274d1c48aed29d375b5ecd38dc37a7b758cabb2
                                                • Instruction Fuzzy Hash: E7F04F39100315FFDB214FA5AC89F5A3BADEF89762F104414F945CA291CA70DC908AA0
                                                APIs
                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0012102A
                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00121036
                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00121045
                                                • RtlAllocateHeap.NTDLL(00000000,?,TokenIntegrityLevel), ref: 0012104C
                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00121062
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: HeapInformationToken$AllocateErrorLastProcess
                                                • String ID:
                                                • API String ID: 47921759-0
                                                • Opcode ID: 8da0688ff3aa13191febc7d76d0e7a451bd031ed38778d45327fc9a525967a93
                                                • Instruction ID: c1653278e230066f064cd2500560ca5a34502c43c411f12f79a10f8166c6cbda
                                                • Opcode Fuzzy Hash: 8da0688ff3aa13191febc7d76d0e7a451bd031ed38778d45327fc9a525967a93
                                                • Instruction Fuzzy Hash: 1DF04F39100355FFDB215FA5EC49F5A3BADEF89762F200414F945CA290CA70D8908AA0
                                                APIs
                                                • CloseHandle.KERNEL32(?,?,?,?,0013017D,?,001332FC,?,00000001,00102592,?), ref: 00130324
                                                • CloseHandle.KERNEL32(?,?,?,?,0013017D,?,001332FC,?,00000001,00102592,?), ref: 00130331
                                                • CloseHandle.KERNEL32(?,?,?,?,0013017D,?,001332FC,?,00000001,00102592,?), ref: 0013033E
                                                • CloseHandle.KERNEL32(?,?,?,?,0013017D,?,001332FC,?,00000001,00102592,?), ref: 0013034B
                                                • CloseHandle.KERNEL32(?,?,?,?,0013017D,?,001332FC,?,00000001,00102592,?), ref: 00130358
                                                • CloseHandle.KERNEL32(?,?,?,?,0013017D,?,001332FC,?,00000001,00102592,?), ref: 00130365
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CloseHandle
                                                • String ID:
                                                • API String ID: 2962429428-0
                                                • Opcode ID: b4de72970c704654712b5ffaae75d8b8ca4363b9257d67d64cff18660d0b4a00
                                                • Instruction ID: 36a4b1e9267a30400de3479db76df40592e8db6ac58a41bc8f677a82a173a13d
                                                • Opcode Fuzzy Hash: b4de72970c704654712b5ffaae75d8b8ca4363b9257d67d64cff18660d0b4a00
                                                • Instruction Fuzzy Hash: 31019872800B15DFCB32AF66D8A0812FBF9BF642153158A3ED19652931C3B1A998CE80
                                                APIs
                                                • _free.LIBCMT ref: 000FD752
                                                  • Part of subcall function 000F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000), ref: 000F29DE
                                                  • Part of subcall function 000F29C8: GetLastError.KERNEL32(00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000,00000000), ref: 000F29F0
                                                • _free.LIBCMT ref: 000FD764
                                                • _free.LIBCMT ref: 000FD776
                                                • _free.LIBCMT ref: 000FD788
                                                • _free.LIBCMT ref: 000FD79A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 5f03b00cfb4c868c3fd05208f92faf1b8d152eefeb90203ecf35f2141a2de9a3
                                                • Instruction ID: 29d0ad801934bce89f955e85ee25156e8d546cc6de177cf0cbbc502a1666be2c
                                                • Opcode Fuzzy Hash: 5f03b00cfb4c868c3fd05208f92faf1b8d152eefeb90203ecf35f2141a2de9a3
                                                • Instruction Fuzzy Hash: 7FF0FF3258830EAB8661FB64F9C5C6A77DEBB447107A40806F258EBD12D774FC80A7B4
                                                APIs
                                                • GetDlgItem.USER32(?,000003E9), ref: 00125C58
                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 00125C6F
                                                • MessageBeep.USER32(00000000), ref: 00125C87
                                                • KillTimer.USER32(?,0000040A), ref: 00125CA3
                                                • EndDialog.USER32(?,00000001), ref: 00125CBD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                • String ID:
                                                • API String ID: 3741023627-0
                                                • Opcode ID: af7bffcce8f5a4dedd386e093c86a0018839ff9a539eeb7e050be94ff956a3f0
                                                • Instruction ID: 0b890fe14db93620f30d0b2c49164e126f61e0ddbf03dc2cfa188ebf058889ab
                                                • Opcode Fuzzy Hash: af7bffcce8f5a4dedd386e093c86a0018839ff9a539eeb7e050be94ff956a3f0
                                                • Instruction Fuzzy Hash: 4D018630500B14EFEB255F10ED8EFA677BDBB04B06F000559A583A55E1EBF0AAE48B90
                                                APIs
                                                • _free.LIBCMT ref: 000F22BE
                                                  • Part of subcall function 000F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000), ref: 000F29DE
                                                  • Part of subcall function 000F29C8: GetLastError.KERNEL32(00000000,?,000FD7D1,00000000,00000000,00000000,00000000,?,000FD7F8,00000000,00000007,00000000,?,000FDBF5,00000000,00000000), ref: 000F29F0
                                                • _free.LIBCMT ref: 000F22D0
                                                • _free.LIBCMT ref: 000F22E3
                                                • _free.LIBCMT ref: 000F22F4
                                                • _free.LIBCMT ref: 000F2305
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: dc920c5aa96564e4ec0faf0866ab35c775ef5bcb82463a1625611c681172c07c
                                                • Instruction ID: 5f342b14bb8839532de3aefccd9305d2b0104601d672d8c9e0fbd46469ae0059
                                                • Opcode Fuzzy Hash: dc920c5aa96564e4ec0faf0866ab35c775ef5bcb82463a1625611c681172c07c
                                                • Instruction Fuzzy Hash: AFF03A71884126AB8613BF54BC018AC3BA4BB19B60710050BF514D7FB2C7702AD1BFE4
                                                APIs
                                                • EndPath.GDI32(?), ref: 000D95D4
                                                • StrokeAndFillPath.GDI32(?,?,001171F7,00000000,?,?,?), ref: 000D95F0
                                                • SelectObject.GDI32(?,00000000), ref: 000D9603
                                                • DeleteObject.GDI32 ref: 000D9616
                                                • StrokePath.GDI32(?), ref: 000D9631
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                • String ID:
                                                • API String ID: 2625713937-0
                                                • Opcode ID: 7a82e0304ac4b490f9c3c951ec0800a4157eb697475086fa59e983aec0f3d429
                                                • Instruction ID: dbeab94d337b0dc8d52bf98d906ebf92e563f548e991b312f249c0a3c6cd05f8
                                                • Opcode Fuzzy Hash: 7a82e0304ac4b490f9c3c951ec0800a4157eb697475086fa59e983aec0f3d429
                                                • Instruction Fuzzy Hash: 6EF0373400670AFFDB625F69ED5CB683BA1EB003AAF048226F425599F0C73189D1DF64
                                                APIs
                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0012187F
                                                • CloseHandle.KERNEL32(?), ref: 00121894
                                                • CloseHandle.KERNEL32(?), ref: 0012189C
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 001218A5
                                                • HeapFree.KERNEL32(00000000), ref: 001218AC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CloseHandleHeap$FreeObjectProcessSingleWait
                                                • String ID:
                                                • API String ID: 3751786701-0
                                                • Opcode ID: 5d9e38e811384c4ddc0bc9332aaac19e9c45f74fcf74aa6c2fe3ab5aa437985d
                                                • Instruction ID: bc5fb2245f94799f2bddfb0cb5e538be1959224f7a1db5e28e55a6d2d2e6ffe0
                                                • Opcode Fuzzy Hash: 5d9e38e811384c4ddc0bc9332aaac19e9c45f74fcf74aa6c2fe3ab5aa437985d
                                                • Instruction Fuzzy Hash: 90E05276104705FFDA015FA5ED0C94ABB69FB49B22B508625F22689871CB32A4A1DB90
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: __freea$_free
                                                • String ID: a/p$am/pm
                                                • API String ID: 3432400110-3206640213
                                                • Opcode ID: 043d16d4f16c46e711c3da1ee47e154d5f24f58a6ab5c6f830f73b0eabe8a73c
                                                • Instruction ID: 9ff2737b3f115868abc35045696de635fece3b78efbb9eb3296ba5fd037f80c1
                                                • Opcode Fuzzy Hash: 043d16d4f16c46e711c3da1ee47e154d5f24f58a6ab5c6f830f73b0eabe8a73c
                                                • Instruction Fuzzy Hash: C3D1DE7190020EDADB688F68C855AFEB7F1FF05310F280119EB01ABE91D7759E80EB91
                                                APIs
                                                  • Part of subcall function 000C7620: _wcslen.LIBCMT ref: 000C7625
                                                  • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                                • _wcslen.LIBCMT ref: 00139506
                                                • _wcslen.LIBCMT ref: 0013952D
                                                • 7523D1A0.COMDLG32(00000058), ref: 00139585
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen$7523
                                                • String ID: X
                                                • API String ID: 1414850397-3081909835
                                                • Opcode ID: d4989b25f28c7665dbb988ca9ce39763fba8b131cde86687fb012eb0428abdf3
                                                • Instruction ID: 0547a395e86a7e0e2b814b578077bf1b9d020eb49b106e16dfb5cd973466fecb
                                                • Opcode Fuzzy Hash: d4989b25f28c7665dbb988ca9ce39763fba8b131cde86687fb012eb0428abdf3
                                                • Instruction Fuzzy Hash: E3E16B716083409FD724EF24C885BAEB7E4BF85314F04896DF8899B2A2DB71DD45CB92
                                                APIs
                                                  • Part of subcall function 000E0242: RtlEnterCriticalSection.NTDLL(0019070C), ref: 000E024D
                                                  • Part of subcall function 000E0242: RtlLeaveCriticalSection.NTDLL(0019070C), ref: 000E028A
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                  • Part of subcall function 000E00A3: __onexit.LIBCMT ref: 000E00A9
                                                • __Init_thread_footer.LIBCMT ref: 00147BFB
                                                  • Part of subcall function 000E01F8: RtlEnterCriticalSection.NTDLL(0019070C), ref: 000E0202
                                                  • Part of subcall function 000E01F8: RtlLeaveCriticalSection.NTDLL(0019070C), ref: 000E0235
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                • String ID: 5$G$Variable must be of type 'Object'.
                                                • API String ID: 535116098-3733170431
                                                • Opcode ID: fda4b939952021b6447c9c186eec047e93f9ddc143c5f1112adb95f374e0d3cd
                                                • Instruction ID: 50b11673c6e000f57f422b4bfd6d3b2de72804ca89b7037a0f5be6d29aeefad8
                                                • Opcode Fuzzy Hash: fda4b939952021b6447c9c186eec047e93f9ddc143c5f1112adb95f374e0d3cd
                                                • Instruction Fuzzy Hash: 61917870A04209EFCB14EF94D991DBDB7B2FF49304F148059F816AB2A2DB71AE85CB51
                                                APIs
                                                  • Part of subcall function 0012B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001221D0,?,?,00000034,00000800,?,00000034), ref: 0012B42D
                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00122760
                                                  • Part of subcall function 0012B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,001221FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0012B3F8
                                                  • Part of subcall function 0012B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0012B355
                                                  • Part of subcall function 0012B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00122194,00000034,?,?,00001004,00000000,00000000), ref: 0012B365
                                                  • Part of subcall function 0012B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00122194,00000034,?,?,00001004,00000000,00000000), ref: 0012B37B
                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 001227CD
                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0012281A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                • String ID: @
                                                • API String ID: 4150878124-2766056989
                                                • Opcode ID: b0543f6659b844c0bdff4520ecda633bfcd878c939e7a1a61d27224bea4ea4ab
                                                • Instruction ID: 70930119dd3e87963004a217d3f5ebc86fc4ec36f4c91b555ef1675440e5438a
                                                • Opcode Fuzzy Hash: b0543f6659b844c0bdff4520ecda633bfcd878c939e7a1a61d27224bea4ea4ab
                                                • Instruction Fuzzy Hash: 27412D72900228BFDB10DFA4DD81ADEBBB8EF15300F004059FA55B7181DB706E55CBA0
                                                APIs
                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\xom6WSISuh.exe,00000104), ref: 000F1769
                                                • _free.LIBCMT ref: 000F1834
                                                • _free.LIBCMT ref: 000F183E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _free$FileModuleName
                                                • String ID: C:\Users\user\Desktop\xom6WSISuh.exe
                                                • API String ID: 2506810119-2306960568
                                                • Opcode ID: fd16331fffe92521b29b14be3ce279180464d5f3c51c284caa414dd160e7b248
                                                • Instruction ID: 7f61819c330f8462a6a59cbfc0f545b0390fb2cb257e425d46d215a8891373c1
                                                • Opcode Fuzzy Hash: fd16331fffe92521b29b14be3ce279180464d5f3c51c284caa414dd160e7b248
                                                • Instruction Fuzzy Hash: 3D31B171A0430DFFCB21EB999981DEEBBFCEB84350F244166E60497611DB704A81EB90
                                                APIs
                                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0012C306
                                                • DeleteMenu.USER32(?,00000007,00000000), ref: 0012C34C
                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00191990,00B624A8), ref: 0012C395
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Menu$Delete$InfoItem
                                                • String ID: 0
                                                • API String ID: 135850232-4108050209
                                                • Opcode ID: dc44fa1bf618d321511555fac3bb8570c6593337219b7d804a0c28d7e7b4c4f5
                                                • Instruction ID: 523b40525d9952b4af78ab7dcca7c7262adc0419d9965458090293cb29807037
                                                • Opcode Fuzzy Hash: dc44fa1bf618d321511555fac3bb8570c6593337219b7d804a0c28d7e7b4c4f5
                                                • Instruction Fuzzy Hash: 3041BE312043519FD724DF25E884B6EBBE8BF95320F008A1DFAA5972D1D730E914CBA2
                                                APIs
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0015CC08,00000000,?,?,?,?), ref: 001544AA
                                                • GetWindowLongW.USER32 ref: 001544C7
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 001544D7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$Long
                                                • String ID: SysTreeView32
                                                • API String ID: 847901565-1698111956
                                                • Opcode ID: 747af6f29087c012aa78ee1dbd2d111aff8b9a976bd71cbff5207acd95741866
                                                • Instruction ID: 008eebb42409e0576dcacfa4fa424bdf95839a0324d4a0a2903df519f44eae17
                                                • Opcode Fuzzy Hash: 747af6f29087c012aa78ee1dbd2d111aff8b9a976bd71cbff5207acd95741866
                                                • Instruction Fuzzy Hash: 74319A31250205AFDF208E78DC45BEA7BA9EB08329F204315FD79A62E1D770EC949B50
                                                APIs
                                                  • Part of subcall function 0014335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00143077,?,?), ref: 00143378
                                                • inet_addr.WS2_32(?), ref: 0014307A
                                                • _wcslen.LIBCMT ref: 0014309B
                                                • htons.WS2_32(00000000), ref: 00143106
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                • String ID: 255.255.255.255
                                                • API String ID: 946324512-2422070025
                                                • Opcode ID: c07e8c51cce65bdd1e7adcec94da97f2596211176323a22774eb13daff32ffe8
                                                • Instruction ID: a4e3dd74fed773adbd3ca7eebdfeab234d7cae1586d240215074856e37dda9e0
                                                • Opcode Fuzzy Hash: c07e8c51cce65bdd1e7adcec94da97f2596211176323a22774eb13daff32ffe8
                                                • Instruction Fuzzy Hash: 5B31D335200301DFDB14CF68C585EAA77E0EF54318F258199E9259B7A2DB72EE45C760
                                                APIs
                                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00154705
                                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00154713
                                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0015471A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$DestroyWindow
                                                • String ID: msctls_updown32
                                                • API String ID: 4014797782-2298589950
                                                • Opcode ID: 4c31d95b911a3ce46d5df0eeb5b4ea630a0cbd6238381749c004429b2ececc5c
                                                • Instruction ID: aa443d9501adfe21d493926a497dd7507c36f0f4683adc80a7ffe76e66c93316
                                                • Opcode Fuzzy Hash: 4c31d95b911a3ce46d5df0eeb5b4ea630a0cbd6238381749c004429b2ececc5c
                                                • Instruction Fuzzy Hash: 0F219DB5600209EFEB11DF64DCC1DAB37ADEB5A3A9B000059FA109B391CB31EC95CB60
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                • API String ID: 176396367-2734436370
                                                • Opcode ID: dc73a6dbbd06fd1760a6b657bbbd71e1dbef1148ae0f06cf8e2aaf8b44bfcc6f
                                                • Instruction ID: ad928abcc11afc8ffc2156ec46df360a1d8a20d7717e3842be08f86c2112a0b5
                                                • Opcode Fuzzy Hash: dc73a6dbbd06fd1760a6b657bbbd71e1dbef1148ae0f06cf8e2aaf8b44bfcc6f
                                                • Instruction Fuzzy Hash: 4E215B32204271AAD331AB2DFC02FFB73D89F51300F10402AF949AB142EB919D66C3E5
                                                APIs
                                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00153840
                                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00153850
                                                • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00153876
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend$MoveWindow
                                                • String ID: Listbox
                                                • API String ID: 3315199576-2633736733
                                                • Opcode ID: d1671245cb824bf490c8afab56ad8b7710bcdec5de20ac3349efe6b1bede9d79
                                                • Instruction ID: 574e02928c6f4db7d5f51248f384777508bc7868c7f975050815be77ba51897d
                                                • Opcode Fuzzy Hash: d1671245cb824bf490c8afab56ad8b7710bcdec5de20ac3349efe6b1bede9d79
                                                • Instruction Fuzzy Hash: FB21B072600218BFEB218F64CC81FAB376AEF89791F108114F9209B190C771DC568BA0
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00134A08
                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00134A5C
                                                • SetErrorMode.KERNEL32(00000000,?,?,0015CC08), ref: 00134AD0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorMode$InformationVolume
                                                • String ID: %lu
                                                • API String ID: 2507767853-685833217
                                                • Opcode ID: c01b3b549fd5f3c7f4934146e7db6ed561eaa38b00ca204107a59e0731434159
                                                • Instruction ID: 0e5db63174e46a988f02dcb8bfa8abe603817a94f7101d25dcce764a3d2a8685
                                                • Opcode Fuzzy Hash: c01b3b549fd5f3c7f4934146e7db6ed561eaa38b00ca204107a59e0731434159
                                                • Instruction Fuzzy Hash: D4310F75A00209AFDB10DF54C985EAE7BF8EF05308F148099F909DB252D775ED45CBA1
                                                APIs
                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0015424F
                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00154264
                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00154271
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: msctls_trackbar32
                                                • API String ID: 3850602802-1010561917
                                                • Opcode ID: fb6870eb4be131d63185a13d7aaef574b1b18b731b0d4fee5848c548c3c34228
                                                • Instruction ID: 5b6f855c76627bf5a90325cf00ac2cd44854ade436af67b35a9d4144a8241623
                                                • Opcode Fuzzy Hash: fb6870eb4be131d63185a13d7aaef574b1b18b731b0d4fee5848c548c3c34228
                                                • Instruction Fuzzy Hash: CB11E331240208BFEF205F29DC46FAB3BACEF95B59F110114FA65EA090D371D8919B20
                                                APIs
                                                  • Part of subcall function 000C6B57: _wcslen.LIBCMT ref: 000C6B6A
                                                  • Part of subcall function 00122DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00122DC5
                                                  • Part of subcall function 00122DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00122DD6
                                                  • Part of subcall function 00122DA7: GetCurrentThreadId.KERNEL32 ref: 00122DDD
                                                  • Part of subcall function 00122DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00122DE4
                                                • GetFocus.USER32 ref: 00122F78
                                                  • Part of subcall function 00122DEE: GetParent.USER32(00000000), ref: 00122DF9
                                                • GetClassNameW.USER32(?,?,00000100), ref: 00122FC3
                                                • EnumChildWindows.USER32(?,0012303B), ref: 00122FEB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                • String ID: %s%d
                                                • API String ID: 1272988791-1110647743
                                                • Opcode ID: 136d2123c2a548f9963da30c590a623b0fff2486d091bb46ef6446261c4c9e76
                                                • Instruction ID: 29ee919053ab3be76429d9a3aef2dd747c3e7158eaece97f74d3d6217bae698d
                                                • Opcode Fuzzy Hash: 136d2123c2a548f9963da30c590a623b0fff2486d091bb46ef6446261c4c9e76
                                                • Instruction Fuzzy Hash: B511E471200319ABCF14BFB09C95EEE37AAAF94304F044079F9199B252DF349A598B70
                                                APIs
                                                • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 001558C1
                                                • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 001558EE
                                                • DrawMenuBar.USER32(?), ref: 001558FD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Menu$InfoItem$Draw
                                                • String ID: 0
                                                • API String ID: 3227129158-4108050209
                                                • Opcode ID: 74dbfb4df364aab463f9c4f0b31fa456bbdb365fa673669b932b6849da631229
                                                • Instruction ID: 7d0618f89a3d9d2315dbd96690bdd18838041d9f533b5ef3c993916515b91bcb
                                                • Opcode Fuzzy Hash: 74dbfb4df364aab463f9c4f0b31fa456bbdb365fa673669b932b6849da631229
                                                • Instruction Fuzzy Hash: 6B016131500318EFDB119F51DC44BAEBBB5FB45366F108099E859DA261EB348A84DF71
                                                APIs
                                                • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0011D3BF
                                                • FreeLibrary.KERNEL32 ref: 0011D3E5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: AddressFreeLibraryProc
                                                • String ID: GetSystemWow64DirectoryW$X64
                                                • API String ID: 3013587201-2590602151
                                                • Opcode ID: 67a9246ead4631ef90ec1755aafb41c8aa3cf42b837e57bbe9d318bdab56b602
                                                • Instruction ID: 843111912f1cd98d8e6a3c2ae258016f35b64ec2cf95ae0fd5d02685cc91741b
                                                • Opcode Fuzzy Hash: 67a9246ead4631ef90ec1755aafb41c8aa3cf42b837e57bbe9d318bdab56b602
                                                • Instruction Fuzzy Hash: D0F0ECB5415B11DAD77C56109CC89E93314BF11711F658177E033F5095EB70C9C1C692
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fa20f8bdc32a29c9d9bf954c5b369f69decf51bbd6bfbc091d69c41e32cf6e24
                                                • Instruction ID: 140dc9c4427a502f4f04f1e133e49f68c32d01f4728729ef2b451d28bd17b72d
                                                • Opcode Fuzzy Hash: fa20f8bdc32a29c9d9bf954c5b369f69decf51bbd6bfbc091d69c41e32cf6e24
                                                • Instruction Fuzzy Hash: A4C18D75A0022AEFDB05CFA4D894EAEB7B5FF48304F118698E405EB252C731ED91CB90
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInitInitializeUninitialize
                                                • String ID:
                                                • API String ID: 1998397398-0
                                                • Opcode ID: 8c2ff499e8f9ac70b36e945e77a782bb36e563d3b2985c5723c2c4b8ab7ce4cd
                                                • Instruction ID: d4f2990d62423e16dbac07b43c11ac4cb43829ad6fffd25b553ebb2a4d181417
                                                • Opcode Fuzzy Hash: 8c2ff499e8f9ac70b36e945e77a782bb36e563d3b2985c5723c2c4b8ab7ce4cd
                                                • Instruction Fuzzy Hash: D9A112756047019FCB00DF28C585A6EB7E5EF88724F05885DF99A9B362DB70EE01CB92
                                                APIs
                                                • ProgIDFromCLSID.COMBASE(?,00000000), ref: 001205F0
                                                • CoTaskMemFree.COMBASE(00000000), ref: 00120608
                                                • CLSIDFromProgID.COMBASE(?,?), ref: 0012062D
                                                • _memcmp.LIBVCRUNTIME ref: 0012064E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: FromProg$FreeTask_memcmp
                                                • String ID:
                                                • API String ID: 314563124-0
                                                • Opcode ID: e9fd9455bc94be2cb42aa23e6b3f3882285749722879432e31fa64b6e16a5f9c
                                                • Instruction ID: 74666082e43c0e102d0f7c99f6ecfe4c9a757a4207b8a6abcef4088b6c1984f7
                                                • Opcode Fuzzy Hash: e9fd9455bc94be2cb42aa23e6b3f3882285749722879432e31fa64b6e16a5f9c
                                                • Instruction Fuzzy Hash: A9813C71A00219EFCB05DF94C988EEEB7B9FF89315F204558E506AB251DB71AE06CF60
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: 20006c60b6ff4c69f743f3d51e61689b1acd8af8ef532028a3dcc48716b998bf
                                                • Instruction ID: 4652eee0b3faf86ad37614c447c0efcde027551edf4762597d85d63f4cea990a
                                                • Opcode Fuzzy Hash: 20006c60b6ff4c69f743f3d51e61689b1acd8af8ef532028a3dcc48716b998bf
                                                • Instruction Fuzzy Hash: B8413931A00505BFDB256FB98C45AFE3AA4FF52330F144229F958D71E3EBB888419262
                                                APIs
                                                • GetWindowRect.USER32(00B6E880,?), ref: 001562E2
                                                • ScreenToClient.USER32(?,?), ref: 00156315
                                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00156382
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$ClientMoveRectScreen
                                                • String ID:
                                                • API String ID: 3880355969-0
                                                • Opcode ID: cf7aa37cb3f36a3621df46b684cd979d749c9ad3f7c6f0e9666e4e1bdbb2282b
                                                • Instruction ID: e32eddbc66bb03d23f336c6588e703a1f37e9a81fea50f6ac3c6e529ce3953c8
                                                • Opcode Fuzzy Hash: cf7aa37cb3f36a3621df46b684cd979d749c9ad3f7c6f0e9666e4e1bdbb2282b
                                                • Instruction Fuzzy Hash: 2E513D74A00209EFCF10DF68D881AAE7BB5FF55365F508169F8699B2A0D730ED85CB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: aa26b9a0038ebd457965aadf402db539ef03af945ade92458bcb4317f3f4152d
                                                • Instruction ID: 8ef4029f8a1e02ad19b60985b5ab059d78e893697a79cbee99464319d5e06b3a
                                                • Opcode Fuzzy Hash: aa26b9a0038ebd457965aadf402db539ef03af945ade92458bcb4317f3f4152d
                                                • Instruction Fuzzy Hash: B441E976900708BFD724AF38CD41BBE7BE9EB84710F10452AF651DBA82D775A9019B80
                                                APIs
                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00135783
                                                • GetLastError.KERNEL32(?,00000000), ref: 001357A9
                                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 001357CE
                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 001357FA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CreateHardLink$DeleteErrorFileLast
                                                • String ID:
                                                • API String ID: 3321077145-0
                                                • Opcode ID: 2969d0fd16115a25dcc9b1f2a89905a0279fe264521c9bd9304380a5ec690e9d
                                                • Instruction ID: cb0e92969092b4d44ad96ee3edcce2164422ffc7cbc21b11be961ed8967da12c
                                                • Opcode Fuzzy Hash: 2969d0fd16115a25dcc9b1f2a89905a0279fe264521c9bd9304380a5ec690e9d
                                                • Instruction Fuzzy Hash: BF411739600A10DFCB11EF15C445A5EBBE2EF89720F598498E84AAB362CB70FD41DF91
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,000E6D71,00000000,00000000,000E82D9,?,000E82D9,?,00000001,000E6D71,8BE85006,00000001,000E82D9,000E82D9), ref: 000FD910
                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 000FD999
                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 000FD9AB
                                                • __freea.LIBCMT ref: 000FD9B4
                                                  • Part of subcall function 000F3820: RtlAllocateHeap.NTDLL(00000000,?,00191444), ref: 000F3852
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                • String ID:
                                                • API String ID: 2652629310-0
                                                • Opcode ID: 0f0833421b00e9986f9bc391eb160dbcc1fa2b18ca91cb720d65ff05d23a97e1
                                                • Instruction ID: 800333e01272c33c5e6cf6d94e5971878e2b06d3dc1a670259845a8cab23f6a6
                                                • Opcode Fuzzy Hash: 0f0833421b00e9986f9bc391eb160dbcc1fa2b18ca91cb720d65ff05d23a97e1
                                                • Instruction Fuzzy Hash: EE31CE72A0020AAFDB259FA5DC45EFE7BA6EB40310B05416AFD04DA151EB75CE50DBA0
                                                APIs
                                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 00155352
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00155375
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00155382
                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 001553A8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: LongWindow$InvalidateMessageRectSend
                                                • String ID:
                                                • API String ID: 3340791633-0
                                                • Opcode ID: 54f38615145cc719df36c6efe18e0f95a45c8edd91cb99ee773a10ef868928b9
                                                • Instruction ID: e78f15492936e14a999a339069147b8eb0fa61a4856b8523ca8560d0f9d27364
                                                • Opcode Fuzzy Hash: 54f38615145cc719df36c6efe18e0f95a45c8edd91cb99ee773a10ef868928b9
                                                • Instruction Fuzzy Hash: 6631B434A55A08EFEB749F14CC25BE83767BB043D2F584112FE299E2E1C7B09988D741
                                                APIs
                                                • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 0012ABF1
                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 0012AC0D
                                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 0012AC74
                                                • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 0012ACC6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: KeyboardState$InputMessagePostSend
                                                • String ID:
                                                • API String ID: 432972143-0
                                                • Opcode ID: e275dc8c3266b06bc4737ba39e0e89b6846a6ac07d4d248c82eb9b94ccf5461b
                                                • Instruction ID: f4af0d687ffba7f4fffba653c7e76c2b9bd81ed11d6b7b080cb0c1110595987c
                                                • Opcode Fuzzy Hash: e275dc8c3266b06bc4737ba39e0e89b6846a6ac07d4d248c82eb9b94ccf5461b
                                                • Instruction Fuzzy Hash: FB312830A04328AFFF38CF64EC047FE7BA5AF85310F84421AE481562D1C3749AB58792
                                                APIs
                                                • ClientToScreen.USER32(?,?), ref: 0015769A
                                                • GetWindowRect.USER32(?,?), ref: 00157710
                                                • PtInRect.USER32(?,?,00158B89), ref: 00157720
                                                • MessageBeep.USER32(00000000), ref: 0015778C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                • String ID:
                                                • API String ID: 1352109105-0
                                                • Opcode ID: 7f46257fa5d0b57ed5d4011eb64d81bcc205696a05a9053bbf202423a061e4d2
                                                • Instruction ID: 7735b5eb68cd4792f07715b995a37310c8838926209ed6c65e6301c6f1348354
                                                • Opcode Fuzzy Hash: 7f46257fa5d0b57ed5d4011eb64d81bcc205696a05a9053bbf202423a061e4d2
                                                • Instruction Fuzzy Hash: 5841AF34605255EFCB02CF58E89AEA977F4FB49306F1540A9E8249F2A1C330A989CF90
                                                APIs
                                                • GetForegroundWindow.USER32 ref: 001516EB
                                                  • Part of subcall function 00123A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00123A57
                                                  • Part of subcall function 00123A3D: GetCurrentThreadId.KERNEL32 ref: 00123A5E
                                                  • Part of subcall function 00123A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,001225B3), ref: 00123A65
                                                • GetCaretPos.USER32(?), ref: 001516FF
                                                • ClientToScreen.USER32(00000000,?), ref: 0015174C
                                                • GetForegroundWindow.USER32 ref: 00151752
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                • String ID:
                                                • API String ID: 2759813231-0
                                                • Opcode ID: 7525dd0112dd8b72b2adfc673519dcc830772e909257143bd7f48ce3c2579857
                                                • Instruction ID: e39e0f7ba58f6ddae5272824f5c4e81efb0b9350a501799bd9d0c371b9ad6cf0
                                                • Opcode Fuzzy Hash: 7525dd0112dd8b72b2adfc673519dcc830772e909257143bd7f48ce3c2579857
                                                • Instruction Fuzzy Hash: 53314371D00249AFD700DFA9C881DEEB7F9EF48304B50806DE425E7212D7359E45CBA0
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 0012D501
                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0012D50F
                                                • Process32NextW.KERNEL32(00000000,?), ref: 0012D52F
                                                • CloseHandle.KERNEL32(00000000), ref: 0012D5DC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                • String ID:
                                                • API String ID: 420147892-0
                                                • Opcode ID: 401e9615c1a488a16f111969d39878b2e60b2ff885b9ffe9b0cfba81e119978f
                                                • Instruction ID: 89d8c9e9ba4e58502fd5f0b023bf39af2253e79737c76553f1c4cda71f1892f0
                                                • Opcode Fuzzy Hash: 401e9615c1a488a16f111969d39878b2e60b2ff885b9ffe9b0cfba81e119978f
                                                • Instruction Fuzzy Hash: 3D317E711083019FD300EF54E885EAFBBF8EF99354F54092DF581861A2EB719999CBA2
                                                APIs
                                                • GetFileAttributesW.KERNEL32(?,0015CB68), ref: 0012D2FB
                                                • GetLastError.KERNEL32 ref: 0012D30A
                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 0012D319
                                                • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0015CB68), ref: 0012D376
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CreateDirectory$AttributesErrorFileLast
                                                • String ID:
                                                • API String ID: 2267087916-0
                                                • Opcode ID: 93ac2561c79dbd02d24f8c48d340666f8d7e019d90b3aa6e9c735d911a3b78e4
                                                • Instruction ID: 7de5004ab907fa81fbd86cfe9ee96c98003c06da25edb7d2fe8a1c59cbf8080e
                                                • Opcode Fuzzy Hash: 93ac2561c79dbd02d24f8c48d340666f8d7e019d90b3aa6e9c735d911a3b78e4
                                                • Instruction Fuzzy Hash: 0F218DB0508311DF8310DF28E8859AE77E4FF56364F504A1DF499C72A2DB309959CB93
                                                APIs
                                                  • Part of subcall function 00121014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0012102A
                                                  • Part of subcall function 00121014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00121036
                                                  • Part of subcall function 00121014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00121045
                                                  • Part of subcall function 00121014: RtlAllocateHeap.NTDLL(00000000,?,TokenIntegrityLevel), ref: 0012104C
                                                  • Part of subcall function 00121014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00121062
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 001215BE
                                                • _memcmp.LIBVCRUNTIME ref: 001215E1
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00121617
                                                • HeapFree.KERNEL32(00000000), ref: 0012161E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Heap$InformationProcessToken$AllocateErrorFreeLastLookupPrivilegeValue_memcmp
                                                • String ID:
                                                • API String ID: 2182266621-0
                                                • Opcode ID: 27cb08893f6e0cb4468aeb374ebddc55911b81b841cfda1198cceb776dba9141
                                                • Instruction ID: d126fd11002577295b32230b9097f9d08f6cdeba1b885667c998cf28184cb005
                                                • Opcode Fuzzy Hash: 27cb08893f6e0cb4468aeb374ebddc55911b81b841cfda1198cceb776dba9141
                                                • Instruction Fuzzy Hash: 2B219A31E00218FFDF00DFA4D945BEEB7B8EFA4355F188499E441AB241E770AA55CBA0
                                                APIs
                                                • GetWindowLongW.USER32(?,000000EC), ref: 0015280A
                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00152824
                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00152832
                                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00152840
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$Long$AttributesLayered
                                                • String ID:
                                                • API String ID: 2169480361-0
                                                • Opcode ID: 80fb0bbd3dbbcf073f23285c8db3f48167c5ab51ed9014e8c4774e494f9c3366
                                                • Instruction ID: 31bba675f517956098f32396970f04f6ead17580ba6388db52125dfec78a8eab
                                                • Opcode Fuzzy Hash: 80fb0bbd3dbbcf073f23285c8db3f48167c5ab51ed9014e8c4774e494f9c3366
                                                • Instruction Fuzzy Hash: 89219032204611EFD714DB24C845FAA7B95AF56325F14815CF8268F6A2C771EC86C7D0
                                                APIs
                                                  • Part of subcall function 00128D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0012790A,?,000000FF,?,00128754,00000000,?,0000001C,?,?), ref: 00128D8C
                                                  • Part of subcall function 00128D7D: lstrcpyW.KERNEL32(00000000,?,?,0012790A,?,000000FF,?,00128754,00000000,?,0000001C,?,?,00000000), ref: 00128DB2
                                                  • Part of subcall function 00128D7D: lstrcmpiW.KERNEL32(00000000,?,0012790A,?,000000FF,?,00128754,00000000,?,0000001C,?,?), ref: 00128DE3
                                                • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00128754,00000000,?,0000001C,?,?,00000000), ref: 00127923
                                                • lstrcpyW.KERNEL32(00000000,?,?,00128754,00000000,?,0000001C,?,?,00000000), ref: 00127949
                                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,00128754,00000000,?,0000001C,?,?,00000000), ref: 00127984
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: lstrcmpilstrcpylstrlen
                                                • String ID: cdecl
                                                • API String ID: 4031866154-3896280584
                                                • Opcode ID: 1434f511678d5548b00eb8c569a4d9291541135254114f9e296fa7ffbcdc5a54
                                                • Instruction ID: d70b34c5b0f10afbbbd4f46f774ee419498087b9d379920309a3baf5129099bb
                                                • Opcode Fuzzy Hash: 1434f511678d5548b00eb8c569a4d9291541135254114f9e296fa7ffbcdc5a54
                                                • Instruction Fuzzy Hash: DA11063A200352AFCF156F34E844D7B77A5FF45364B00402AF906CB3A4EB319861C7A1
                                                APIs
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00157D0B
                                                • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00157D2A
                                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00157D42
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0013B7AD,00000000), ref: 00157D6B
                                                  • Part of subcall function 000D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 000D9BB2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$Long
                                                • String ID:
                                                • API String ID: 847901565-0
                                                • Opcode ID: b07def83a732ce2c5b7493330ad9c766716cb3200f902db2e6d88344ddbb0e62
                                                • Instruction ID: 5a7aff582a56e7f79f0d2a86fb57e34c2a14909572f3aea7f97950f7522ef3d5
                                                • Opcode Fuzzy Hash: b07def83a732ce2c5b7493330ad9c766716cb3200f902db2e6d88344ddbb0e62
                                                • Instruction Fuzzy Hash: CB11CD31214755EFCB108FA8EC04AAA3BA5BF45362B114729FC39DB2F0E7319994CB90
                                                APIs
                                                • SendMessageW.USER32(?,00001060,?,00000004), ref: 001556BB
                                                • _wcslen.LIBCMT ref: 001556CD
                                                • _wcslen.LIBCMT ref: 001556D8
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00155816
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend_wcslen
                                                • String ID:
                                                • API String ID: 455545452-0
                                                • Opcode ID: af647d079aa09a203a97e73b22a0d42befb2ff658070f527994e19e6ed4c3751
                                                • Instruction ID: faedacecb7b079ceddde45aa54d454b7b6c40150e6d5d40cfb788fd7c018558e
                                                • Opcode Fuzzy Hash: af647d079aa09a203a97e73b22a0d42befb2ff658070f527994e19e6ed4c3751
                                                • Instruction Fuzzy Hash: 2B11D671A00604EADF209F61CC95AEE777CEF10766B104026FD25EE081E770CA88CB60
                                                APIs
                                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 001214FF
                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00121506
                                                • CloseHandle.KERNEL32(00000004), ref: 00121520
                                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0012154F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Process$CloseCreateCurrentHandleLogonOpenTokenWith
                                                • String ID:
                                                • API String ID: 2621361867-0
                                                • Opcode ID: 5f6227ca41c7a357fd9a5bced16900bdc6ac5e9e21e80d740f867c981fedea63
                                                • Instruction ID: cb742495d1963dfb0d85c21db20141a912d1e92036ecb8521de50a4011a17f11
                                                • Opcode Fuzzy Hash: 5f6227ca41c7a357fd9a5bced16900bdc6ac5e9e21e80d740f867c981fedea63
                                                • Instruction Fuzzy Hash: EA11447250024DFFDB11CFA8ED49BDA7BA9EB48705F044064FA05A60A0C3718EA0DBA0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 55688b62effe2a5526434a2b6cde107393a47df57199f0d6ff63fc0dccb49a8a
                                                • Instruction ID: 17f1165609386c9880958cafff686437077eeedb8aefa3da2af135f126e44036
                                                • Opcode Fuzzy Hash: 55688b62effe2a5526434a2b6cde107393a47df57199f0d6ff63fc0dccb49a8a
                                                • Instruction Fuzzy Hash: 860162B2209A1EBEF7611A786CC1FB766ADDF413B8B341325F721A59D2DB608C4061A0
                                                APIs
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00121A47
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00121A59
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00121A6F
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00121A8A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: 811310a1a073faea1d2f31a124a8ff5fb0b913483f95f63b88b2af4e1bb4b92e
                                                • Instruction ID: 2a1c6cc10cb1535b7567c54c1578c6e0190e2377408007e2864dc69f3e32ea59
                                                • Opcode Fuzzy Hash: 811310a1a073faea1d2f31a124a8ff5fb0b913483f95f63b88b2af4e1bb4b92e
                                                • Instruction Fuzzy Hash: 7411273A901229FFEB10DBA4C985FADBB79EB18750F2000A1EA00B7290D7716E50DB94
                                                APIs
                                                • GetCurrentThreadId.KERNEL32 ref: 0012E1FD
                                                • MessageBoxW.USER32(?,?,?,?), ref: 0012E230
                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0012E246
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0012E24D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                • String ID:
                                                • API String ID: 2880819207-0
                                                • Opcode ID: 3d734a48f17922cf81408f9437a9ed0347efa1c29a1790564d02ed5847dd1a2a
                                                • Instruction ID: 4b048ef6537beb9f3771a9c4f19a2ca6e3e785e662c5c371fd38efd24893f06f
                                                • Opcode Fuzzy Hash: 3d734a48f17922cf81408f9437a9ed0347efa1c29a1790564d02ed5847dd1a2a
                                                • Instruction Fuzzy Hash: 36110876904365FFC7019FA8AC05A9E7FADEB45321F10421AF925E7691D3708A808BA0
                                                APIs
                                                • CreateThread.KERNEL32(00000000,?,000ECFF9,00000000,00000004,00000000), ref: 000ED218
                                                • GetLastError.KERNEL32 ref: 000ED224
                                                • __dosmaperr.LIBCMT ref: 000ED22B
                                                • ResumeThread.KERNEL32(00000000), ref: 000ED249
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                • String ID:
                                                • API String ID: 173952441-0
                                                • Opcode ID: b434d752c6325948d743f7add12bbbcfb04c669eaeaabc487adf65799818043c
                                                • Instruction ID: 3b61852498900c805f8ae008adc19dc925eaf45c920757402f8faf70ffc9c5de
                                                • Opcode Fuzzy Hash: b434d752c6325948d743f7add12bbbcfb04c669eaeaabc487adf65799818043c
                                                • Instruction Fuzzy Hash: B8012636805248BFC7205FA7DC05BAE3B69EF81331F10025EFA24A61D1CB718841D6A0
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 000C604C
                                                • GetStockObject.GDI32(00000011), ref: 000C6060
                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 000C606A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CreateMessageObjectSendStockWindow
                                                • String ID:
                                                • API String ID: 3970641297-0
                                                • Opcode ID: 43ad090990e3f323d80fdff850e9843c3206a44b05aad776b21f13872f2660f9
                                                • Instruction ID: 1287eeaf26e87f2f87df580236384bf742f0935efe4cb483226055f0253edbeb
                                                • Opcode Fuzzy Hash: 43ad090990e3f323d80fdff850e9843c3206a44b05aad776b21f13872f2660f9
                                                • Instruction Fuzzy Hash: DA115E72501609FFEF224F949C54FEF7BA9EF1C355F150115FA1466150D732ACA09B90
                                                APIs
                                                • ___BuildCatchObject.LIBVCRUNTIME ref: 000E3B56
                                                  • Part of subcall function 000E3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 000E3AD2
                                                  • Part of subcall function 000E3AA3: ___AdjustPointer.LIBCMT ref: 000E3AED
                                                • _UnwindNestedFrames.LIBCMT ref: 000E3B6B
                                                • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 000E3B7C
                                                • CallCatchBlock.LIBVCRUNTIME ref: 000E3BA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                • String ID:
                                                • API String ID: 737400349-0
                                                • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                • Instruction ID: c29a8c94b6cfaf17b75cc823f3b5dc4f8d5095e70e9e3b454a061cd1d8282620
                                                • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                • Instruction Fuzzy Hash: D7010072100189BFDF125E96CC46DEB7F6DEF98754F044054FE4866122C736D961DBA0
                                                APIs
                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,000C13C6,00000000,00000000,?,000F301A,000C13C6,00000000,00000000,00000000,?,000F328B,00000006,FlsSetValue), ref: 000F30A5
                                                • GetLastError.KERNEL32(?,000F301A,000C13C6,00000000,00000000,00000000,?,000F328B,00000006,FlsSetValue,00162290,FlsSetValue,00000000,00000364,?,000F2E46), ref: 000F30B1
                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,000F301A,000C13C6,00000000,00000000,00000000,?,000F328B,00000006,FlsSetValue,00162290,FlsSetValue,00000000), ref: 000F30BF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: LibraryLoad$ErrorLast
                                                • String ID:
                                                • API String ID: 3177248105-0
                                                • Opcode ID: ff07ab37262f860fc2557e2879dcb3638503e50973fbb78ceb9241d9035d9ae2
                                                • Instruction ID: 53ac30f2727a46e474d74fc2f41a2414431a5e6f4fad5538246ab4a681c15bc7
                                                • Opcode Fuzzy Hash: ff07ab37262f860fc2557e2879dcb3638503e50973fbb78ceb9241d9035d9ae2
                                                • Instruction Fuzzy Hash: 0801D43230132AEFCB714AB99C54A7B7BD8AF05BB1B100621FA05E7A40CF21D981D6E0
                                                APIs
                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0012747F
                                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00127497
                                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 001274AC
                                                • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 001274CA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Type$Register$FileLoadModuleNameUser
                                                • String ID:
                                                • API String ID: 1352324309-0
                                                • Opcode ID: e0d782357d96183525a9970bf71ad673c62f5da785eb7c7dd8b19098ab955b4d
                                                • Instruction ID: 9d8086fe413ae227ab718cfb27d500ed43ed01ce1fa985791dede7bef7940d57
                                                • Opcode Fuzzy Hash: e0d782357d96183525a9970bf71ad673c62f5da785eb7c7dd8b19098ab955b4d
                                                • Instruction Fuzzy Hash: 1011C0B1209360EFE720AF14EC08FA37FFCEB00B00F108569A616DA591D7B0E954DBA1
                                                APIs
                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0012ACD3,?,00008000), ref: 0012B0C4
                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0012ACD3,?,00008000), ref: 0012B0E9
                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0012ACD3,?,00008000), ref: 0012B0F3
                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0012ACD3,?,00008000), ref: 0012B126
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CounterPerformanceQuerySleep
                                                • String ID:
                                                • API String ID: 2875609808-0
                                                • Opcode ID: 127bae2073eef5212a4aec2389173524c9b03542aa48fa38a4bda71aba130080
                                                • Instruction ID: 8b604d23a39c10258e0c71522f56c6206ee31d21a667480fc0f9c3630310d499
                                                • Opcode Fuzzy Hash: 127bae2073eef5212a4aec2389173524c9b03542aa48fa38a4bda71aba130080
                                                • Instruction Fuzzy Hash: 0E113C71C05A39DBCF04AFA4F9A86EEBB78FF09711F114085D941B6141CB3056608B95
                                                APIs
                                                • GetWindowRect.USER32(?,?), ref: 00157E33
                                                • ScreenToClient.USER32(?,?), ref: 00157E4B
                                                • ScreenToClient.USER32(?,?), ref: 00157E6F
                                                • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00157E8A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ClientRectScreen$InvalidateWindow
                                                • String ID:
                                                • API String ID: 357397906-0
                                                • Opcode ID: 47c7042000d0ff6a0e89fa9e5e34e3cefcc10b5a25749bbaf7112c66411c214f
                                                • Instruction ID: 20b76d947c6cba400b91e069236fd0eb6c71874a52d5f973648dc3b81018dc83
                                                • Opcode Fuzzy Hash: 47c7042000d0ff6a0e89fa9e5e34e3cefcc10b5a25749bbaf7112c66411c214f
                                                • Instruction Fuzzy Hash: 151163B9D0024AEFDB41CF98C8859EEBBF5FB08311F104056E911E6610D734AA94CF90
                                                APIs
                                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00122DC5
                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00122DD6
                                                • GetCurrentThreadId.KERNEL32 ref: 00122DDD
                                                • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00122DE4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                • String ID:
                                                • API String ID: 2710830443-0
                                                • Opcode ID: fe62b11faf6eebfd1ff1998d2e3d8a3bbba2f1127e531f70895fa90fb17243ff
                                                • Instruction ID: 5380fb42fb313400a98b59ace4d83c881a7bb8eea34c155c187364d76db16aaa
                                                • Opcode Fuzzy Hash: fe62b11faf6eebfd1ff1998d2e3d8a3bbba2f1127e531f70895fa90fb17243ff
                                                • Instruction Fuzzy Hash: 50E06D72101338BBD7201BB2AC0DEEB3E6CEB42BA2F000015F105D95809AA48980C6F0
                                                APIs
                                                  • Part of subcall function 000D9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 000D9693
                                                  • Part of subcall function 000D9639: SelectObject.GDI32(?,00000000), ref: 000D96A2
                                                  • Part of subcall function 000D9639: BeginPath.GDI32(?), ref: 000D96B9
                                                  • Part of subcall function 000D9639: SelectObject.GDI32(?,00000000), ref: 000D96E2
                                                • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00158887
                                                • LineTo.GDI32(?,?,?), ref: 00158894
                                                • EndPath.GDI32(?), ref: 001588A4
                                                • StrokePath.GDI32(?), ref: 001588B2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                • String ID:
                                                • API String ID: 1539411459-0
                                                • Opcode ID: b162f5da58bd7644744c4d41e9fe985549d364f8696e15ff2416bd6e9d59aca3
                                                • Instruction ID: 6545be7ec4a0f443d010cb5797108fecc51821cead222d374c7e470d1698f754
                                                • Opcode Fuzzy Hash: b162f5da58bd7644744c4d41e9fe985549d364f8696e15ff2416bd6e9d59aca3
                                                • Instruction Fuzzy Hash: 7DF05E3A041359FEDB126F94AC09FCE3F59AF06312F048001FA21694E2C7755591CFE5
                                                APIs
                                                • GetSysColor.USER32(00000008), ref: 000D98CC
                                                • SetTextColor.GDI32(?,?), ref: 000D98D6
                                                • SetBkMode.GDI32(?,00000001), ref: 000D98E9
                                                • GetStockObject.GDI32(00000005), ref: 000D98F1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Color$ModeObjectStockText
                                                • String ID:
                                                • API String ID: 4037423528-0
                                                • Opcode ID: 39645783c03668560f5a75dd4a5b5b7dfed226c259317220db9cef907625adf1
                                                • Instruction ID: baa82235b9ca9b3b9af8662e25601c4e15d631cbe32a8aa3b1eb3dad159c1b06
                                                • Opcode Fuzzy Hash: 39645783c03668560f5a75dd4a5b5b7dfed226c259317220db9cef907625adf1
                                                • Instruction Fuzzy Hash: 6CE06D31244780EEDB215F78AC09BE83F61AB52336F04822AF6FA585E1C77146809B21
                                                APIs
                                                • GetCurrentThread.KERNEL32 ref: 00121634
                                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,001211D9), ref: 0012163B
                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,001211D9), ref: 00121648
                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,001211D9), ref: 0012164F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CurrentOpenProcessThreadToken
                                                • String ID:
                                                • API String ID: 3974789173-0
                                                • Opcode ID: fe09611abc96e9289b93defb5327a4392ac0b843650aa8afca744ecf548353d7
                                                • Instruction ID: 17a9d7aa1a0c289c449be4845a2e8ace485ab1f83db82fc57ea32d14d129dadf
                                                • Opcode Fuzzy Hash: fe09611abc96e9289b93defb5327a4392ac0b843650aa8afca744ecf548353d7
                                                • Instruction Fuzzy Hash: EFE04F75602321EFD7601FA0AD0DB4B3B68AF54B92F144808F245CD080D7644480C790
                                                APIs
                                                • GetDesktopWindow.USER32 ref: 0011D858
                                                • GetDC.USER32(00000000), ref: 0011D862
                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0011D882
                                                • ReleaseDC.USER32(?), ref: 0011D8A3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                • String ID:
                                                • API String ID: 2889604237-0
                                                • Opcode ID: 03e7dc9e5dab3e301f94913d416cc247cf520534a6236a2a3459ee746334dcde
                                                • Instruction ID: 9a3924759927e36a0dca458ba588ee91214ebe4874df88ef21ea076839b43e28
                                                • Opcode Fuzzy Hash: 03e7dc9e5dab3e301f94913d416cc247cf520534a6236a2a3459ee746334dcde
                                                • Instruction Fuzzy Hash: 62E01AB4800304DFCF419FA0D808A6DBBB1FB08312F108019F80AEB750C7384A82EF90
                                                APIs
                                                • GetDesktopWindow.USER32 ref: 0011D86C
                                                • GetDC.USER32(00000000), ref: 0011D876
                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0011D882
                                                • ReleaseDC.USER32(?), ref: 0011D8A3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                • String ID:
                                                • API String ID: 2889604237-0
                                                • Opcode ID: 1fbd7449d924112380fc5c11a3c303b26cef01a2226dbd0f7715ea39393b6115
                                                • Instruction ID: 08a75bbb2edbfb1cc04651fac4bcf8c057427ab7c7a0fbd6f2482ec3e94e6f0e
                                                • Opcode Fuzzy Hash: 1fbd7449d924112380fc5c11a3c303b26cef01a2226dbd0f7715ea39393b6115
                                                • Instruction Fuzzy Hash: BBE09A75800304DFCF519FA0D808A6DBBB5FB48712B148459F94AEB750C7385A42EF90
                                                APIs
                                                  • Part of subcall function 000C7620: _wcslen.LIBCMT ref: 000C7625
                                                • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00134ED4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Connection_wcslen
                                                • String ID: *$LPT
                                                • API String ID: 1725874428-3443410124
                                                • Opcode ID: 6c659d8f5f01c02657a153e754c37c44e1999e294d68def0d4b56f5fc42c3753
                                                • Instruction ID: 24ebeaa50edb660d248db61a0ccb75f3532bc65f69eb284c82933b61b7ac9c2f
                                                • Opcode Fuzzy Hash: 6c659d8f5f01c02657a153e754c37c44e1999e294d68def0d4b56f5fc42c3753
                                                • Instruction Fuzzy Hash: CD916C75A002049FCB14DF58C484EAEBBF5BF49304F198099E84A9F3A2C775EE85CB90
                                                APIs
                                                • OleSetContainedObject.OLE32(?,00000001), ref: 00124F4B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ContainedObject
                                                • String ID: AutoIt3GUI$Container
                                                • API String ID: 3565006973-3941886329
                                                • Opcode ID: fd6523ff9edc1ba20af4c184b917a2212a50d2183d09ccf6b629cb89ec478723
                                                • Instruction ID: b5ad5789a9b20b51a81aacc992c48c42186161350d7709b43d89a733d5367dd4
                                                • Opcode Fuzzy Hash: fd6523ff9edc1ba20af4c184b917a2212a50d2183d09ccf6b629cb89ec478723
                                                • Instruction Fuzzy Hash: B4814870200711AFDB14DF68C984A6ABBF9FF48705F11856EF94ADB291DBB0E941CB60
                                                APIs
                                                • __startOneArgErrorHandling.LIBCMT ref: 000EE30D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ErrorHandling__start
                                                • String ID: pow
                                                • API String ID: 3213639722-2276729525
                                                • Opcode ID: 4adeffd14eb6958e17bbefbecd319c10e827a64c21c268e094347c8d824e7be0
                                                • Instruction ID: c54ebbc3772fa74029bb4fb1705591589a0170d3315e1822c3eb4bf75e924392
                                                • Opcode Fuzzy Hash: 4adeffd14eb6958e17bbefbecd319c10e827a64c21c268e094347c8d824e7be0
                                                • Instruction Fuzzy Hash: 0651C061A0C18E9ACB257B25CD053BD3BE4EB40740F3049A9E1D953AE9EB308CC1AA43
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: #
                                                • API String ID: 0-1885708031
                                                • Opcode ID: c7d6b4683fc727a100783c036e2fae0b82cda9dd39241364f056c724b4a6eaef
                                                • Instruction ID: 5ef1341e69ab29ea2f6c44a2419b71fb2108e780664abfd71c634dfaa6df2d66
                                                • Opcode Fuzzy Hash: c7d6b4683fc727a100783c036e2fae0b82cda9dd39241364f056c724b4a6eaef
                                                • Instruction Fuzzy Hash: D351E1359043869EEB19EFA8C481AFE7BE4EF55310F64406AEC519B2D1D7309D82CBA0
                                                APIs
                                                • Sleep.KERNEL32(00000000), ref: 000DF2A2
                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 000DF2BB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: GlobalMemorySleepStatus
                                                • String ID: @
                                                • API String ID: 2783356886-2766056989
                                                • Opcode ID: a2820fb96d838d814b5cdf96376c6f38f9776c4a02e5e36cfadef16c9d25d580
                                                • Instruction ID: 8ff3cce9c03feabd3c2b0badf5a327817842ebd4fe15aff87daa0fc1813827ce
                                                • Opcode Fuzzy Hash: a2820fb96d838d814b5cdf96376c6f38f9776c4a02e5e36cfadef16c9d25d580
                                                • Instruction Fuzzy Hash: 75513771408744ABE320AF14DC86BAFBBF8FB84300F81885DF1D941196EB718569CB67
                                                APIs
                                                • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 001457E0
                                                • _wcslen.LIBCMT ref: 001457EC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper_wcslen
                                                • String ID: CALLARGARRAY
                                                • API String ID: 157775604-1150593374
                                                • Opcode ID: 49b9c23d167decf631441150bf71a18e54901e48737c74841a7b74efd4fdbf35
                                                • Instruction ID: b651d68b735c9721f051c698207b020c3398757f9d6c050ae90a3679b60d86d6
                                                • Opcode Fuzzy Hash: 49b9c23d167decf631441150bf71a18e54901e48737c74841a7b74efd4fdbf35
                                                • Instruction Fuzzy Hash: 9F419471E0020ADFCB14DFA9C8859FEBBB6FF59314F104069E515A72A2DB309D81CBA0
                                                APIs
                                                • _wcslen.LIBCMT ref: 0013D130
                                                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0013D13A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CrackInternet_wcslen
                                                • String ID: |
                                                • API String ID: 596671847-2343686810
                                                • Opcode ID: a8225a8bf73c7abed1c08538cf9a8035fd21e67e1b0fc29308c9455b9a9dac1a
                                                • Instruction ID: 2b4866ce4bfa2f9f6c2f199037c7bfe1a6eb1ff9f4f5245806c27b87c86f2203
                                                • Opcode Fuzzy Hash: a8225a8bf73c7abed1c08538cf9a8035fd21e67e1b0fc29308c9455b9a9dac1a
                                                • Instruction Fuzzy Hash: 45313D71D00209ABCF15EFA5DC85EEE7FB9FF04300F000059F815A6162DB32AA56CB60
                                                APIs
                                                • DestroyWindow.USER32(?,?,?,?), ref: 00153621
                                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0015365C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$DestroyMove
                                                • String ID: static
                                                • API String ID: 2139405536-2160076837
                                                • Opcode ID: d34c118a29adffd87730303404b06601a70bd1ea34dff30406cf36edd19ebff7
                                                • Instruction ID: c6f39ef7acc13139873eebce04692700a3a61c6ceb52cc5bc3c067ccae055ba4
                                                • Opcode Fuzzy Hash: d34c118a29adffd87730303404b06601a70bd1ea34dff30406cf36edd19ebff7
                                                • Instruction Fuzzy Hash: EF317A71110604AEDB109F28D880EFB73A9FF88761F10961DF8B59B290DB31A9869760
                                                APIs
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 0015461F
                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00154634
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: '
                                                • API String ID: 3850602802-1997036262
                                                • Opcode ID: 7fcfe72eb8cce06ef911cc510c994c06f78d5721caecdbc8de31160c7b98bb0a
                                                • Instruction ID: 2e43ca9b1203facc0503bcc1d06375fa905289b2da9dc896bb1377f2a36fa5f0
                                                • Opcode Fuzzy Hash: 7fcfe72eb8cce06ef911cc510c994c06f78d5721caecdbc8de31160c7b98bb0a
                                                • Instruction Fuzzy Hash: 6D311674A0130AEFDB14CFA9C990BDA7BB5FB09305F10406AED14AB341E770A985CF90
                                                APIs
                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0015327C
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00153287
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: Combobox
                                                • API String ID: 3850602802-2096851135
                                                • Opcode ID: 9a247d441a60a5547de56ed437399b734c5015ca05fe7a2111df6b186ab3fda9
                                                • Instruction ID: 45f4be2c4ef013517de6c0e189b89fecc169478a8b5c004bcb99ea0d336640dd
                                                • Opcode Fuzzy Hash: 9a247d441a60a5547de56ed437399b734c5015ca05fe7a2111df6b186ab3fda9
                                                • Instruction Fuzzy Hash: 7A11B271300608BFEF259F54DC80EFB376AEB943A5F104129F938AB290D7319D959760
                                                APIs
                                                  • Part of subcall function 000C600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 000C604C
                                                  • Part of subcall function 000C600E: GetStockObject.GDI32(00000011), ref: 000C6060
                                                  • Part of subcall function 000C600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 000C606A
                                                • GetWindowRect.USER32(00000000,?), ref: 0015377A
                                                • GetSysColor.USER32(00000012), ref: 00153794
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                • String ID: static
                                                • API String ID: 1983116058-2160076837
                                                • Opcode ID: 521ad57226d8a94aad1ecf84798a4b8b519991dd7ebefc47e2353176ba285585
                                                • Instruction ID: bb44183cfedf7894bee1570878b5663cfd9ad8706f2a466a09a1775c61e473ab
                                                • Opcode Fuzzy Hash: 521ad57226d8a94aad1ecf84798a4b8b519991dd7ebefc47e2353176ba285585
                                                • Instruction Fuzzy Hash: B11159B2A1020AEFDB00DFA8CC45EEA7BB8FB08345F004514FD65E7250E735E8559B50
                                                APIs
                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0013CD7D
                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0013CDA6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Internet$OpenOption
                                                • String ID: <local>
                                                • API String ID: 942729171-4266983199
                                                • Opcode ID: e6b5e2c621bd1fd984527b197a919a8a5bd24e59ea644c76b3f57ccdf2ef7cd8
                                                • Instruction ID: ee290d228ee05edcdbb6aa1e288183b14e8bf88a2a9ae16061f54ade5f1a08a4
                                                • Opcode Fuzzy Hash: e6b5e2c621bd1fd984527b197a919a8a5bd24e59ea644c76b3f57ccdf2ef7cd8
                                                • Instruction Fuzzy Hash: 7D11C275205631BAD7384FA68C49EE7BEACEF127A4F00422AB109A7080D7709940D7F0
                                                APIs
                                                • GetWindowTextLengthW.USER32(00000000), ref: 001534AB
                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 001534BA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: LengthMessageSendTextWindow
                                                • String ID: edit
                                                • API String ID: 2978978980-2167791130
                                                • Opcode ID: 30f2651b59b558c6f953a82a7177b2363e70cd088670b06efc3bbe9e526064d3
                                                • Instruction ID: 5beccc9d688042092cdec4c695868b6844016ac3140560ec16448efe1616add5
                                                • Opcode Fuzzy Hash: 30f2651b59b558c6f953a82a7177b2363e70cd088670b06efc3bbe9e526064d3
                                                • Instruction Fuzzy Hash: D7116D71100208EFEB124E64DC44AEB376AEB153B5F504724FD719B1D0C771DD999750
                                                APIs
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                • CharUpperBuffW.USER32(?,?,?), ref: 00126CB6
                                                • _wcslen.LIBCMT ref: 00126CC2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharUpper
                                                • String ID: STOP
                                                • API String ID: 1256254125-2411985666
                                                • Opcode ID: c0d5aeeec840b5a7fefc64aa442c1aba8072aaef7a554cc15f550b7768f59aa3
                                                • Instruction ID: 98af179847d0cc5088e532365c7a6b6a0e183187fad9ba0b5cab2e343669eb3d
                                                • Opcode Fuzzy Hash: c0d5aeeec840b5a7fefc64aa442c1aba8072aaef7a554cc15f550b7768f59aa3
                                                • Instruction Fuzzy Hash: CA01D232A0053A8BCB20AFFDEC819BF77B5EB617547510529E8A2A71D1EB31D960C690
                                                APIs
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                  • Part of subcall function 00123CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00123CCA
                                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00121D4C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_wcslen
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 624084870-1403004172
                                                • Opcode ID: 69875d99f803492efa3f732e3d211b132daa77e98ed5616a232af87c1498e3cd
                                                • Instruction ID: aa5358293a4df2c7745149b34660b30f2803a207fc7e4139105acb24b16f1885
                                                • Opcode Fuzzy Hash: 69875d99f803492efa3f732e3d211b132daa77e98ed5616a232af87c1498e3cd
                                                • Instruction Fuzzy Hash: 8C01D875601228FBCB08EFE4EC59DFE7769EB66350B44091AF832573C2EB3059288760
                                                APIs
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                  • Part of subcall function 00123CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00123CCA
                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 00121C46
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_wcslen
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 624084870-1403004172
                                                • Opcode ID: 948fcfca07eae753faf90308bf311d2791a0326a89a7a2bef3806da3b538f42b
                                                • Instruction ID: 3865505470f60baca1d3fd0afd6397d4ee4423f644069c3e7eff138c64121e2d
                                                • Opcode Fuzzy Hash: 948fcfca07eae753faf90308bf311d2791a0326a89a7a2bef3806da3b538f42b
                                                • Instruction Fuzzy Hash: 1F0167756811187BCB18FB90E956EFF77A99B25340F140019A416772C2EB249F3C87B5
                                                APIs
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                  • Part of subcall function 00123CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00123CCA
                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 00121CC8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_wcslen
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 624084870-1403004172
                                                • Opcode ID: 8fa8e4f85510a1b4c83472b54cc5d69e06c917a04f9057feef8acf1458998049
                                                • Instruction ID: 7f4740ebbab7bd4f1c9f65ac77f444f3086315226b7e81e964e64167b707a798
                                                • Opcode Fuzzy Hash: 8fa8e4f85510a1b4c83472b54cc5d69e06c917a04f9057feef8acf1458998049
                                                • Instruction Fuzzy Hash: AA01D67568022877CB04FBA0DA56EFE77A99B31340F540029B81273282EB209F38C7B1
                                                APIs
                                                  • Part of subcall function 000C9CB3: _wcslen.LIBCMT ref: 000C9CBD
                                                  • Part of subcall function 00123CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00123CCA
                                                • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00121DD3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_wcslen
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 624084870-1403004172
                                                • Opcode ID: 56f569ff60cac8f901a18c093953d30dc3bcdd51e2cf3301d9c269cb8307b3d3
                                                • Instruction ID: 3a26d6819d5d38b8a0739aa145ffdbb171f5be3535e7b42b8a82c896d23fdeb9
                                                • Opcode Fuzzy Hash: 56f569ff60cac8f901a18c093953d30dc3bcdd51e2cf3301d9c269cb8307b3d3
                                                • Instruction Fuzzy Hash: 58F0A971A41228B7D714FBE4DC5AFFE7768AB21350F440919B432672C2DB605A288660
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: 3, 3, 16, 1
                                                • API String ID: 176396367-3042988571
                                                • Opcode ID: d6b4e08805b5855b4ef86875176dfffff6bf421ff332bf280ae3fea6705678c4
                                                • Instruction ID: 72aba16aeedd1d01038284d9b7c35ba7109720ec8f98a045a7d31c865c76579d
                                                • Opcode Fuzzy Hash: d6b4e08805b5855b4ef86875176dfffff6bf421ff332bf280ae3fea6705678c4
                                                • Instruction Fuzzy Hash: D8E02B02204260149231227AACC19BF5789DFC9750718182BF981E22F7EB94CD9193F1
                                                APIs
                                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00120B23
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: Message
                                                • String ID: AutoIt$Error allocating memory.
                                                • API String ID: 2030045667-4017498283
                                                • Opcode ID: a8a6480486c1ed3237e7e67d82b4f3b61cf80bfb63f455c637645fa82febe962
                                                • Instruction ID: b497d935ceefffc428ef07f9e164a95eecf8f1c96e060d0721c1ec1b944a6195
                                                • Opcode Fuzzy Hash: a8a6480486c1ed3237e7e67d82b4f3b61cf80bfb63f455c637645fa82febe962
                                                • Instruction Fuzzy Hash: 65E0D8312443186ED2203B957C03FC97B85CF09F55F10446BFB58695C38BE2259046E9
                                                APIs
                                                  • Part of subcall function 000DF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(00190A88,00000000,00190A74,000E0D71,?,?,?,000C100A), ref: 000DF7CE
                                                • IsDebuggerPresent.KERNEL32(?,?,?,000C100A), ref: 000E0D75
                                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,000C100A), ref: 000E0D84
                                                Strings
                                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 000E0D7F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                • API String ID: 55579361-631824599
                                                • Opcode ID: 156779dc952e715e7b1003198834865cce243b7c3e435bab9b8b8eee3315e589
                                                • Instruction ID: 08ab6df9a05a67394b15aa1910d59a637a69fed563120ebcd7b97bef85a15c3b
                                                • Opcode Fuzzy Hash: 156779dc952e715e7b1003198834865cce243b7c3e435bab9b8b8eee3315e589
                                                • Instruction Fuzzy Hash: 5EE06D74204341CFD3609FB9D8087967BE0EB00745F01892DE892DAA52DBF5E4C8CBA1
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: LocalTime
                                                • String ID: %.3d$X64
                                                • API String ID: 481472006-1077770165
                                                • Opcode ID: 0d8d623c6b9dd0b18be798a3fc7de17b52d25feff83a3d294fed470b0952ee59
                                                • Instruction ID: eb8bce1e9d741ea56f71f1d972f71fec7e4d409eb0fa8694b2249e15763d7e85
                                                • Opcode Fuzzy Hash: 0d8d623c6b9dd0b18be798a3fc7de17b52d25feff83a3d294fed470b0952ee59
                                                • Instruction Fuzzy Hash: 8AD01261808219E9CB5C96D0EC459F9B37CFB19341F618473F81791040E734D5886B62
                                                APIs
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0015232C
                                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0015233F
                                                  • Part of subcall function 0012E97B: Sleep.KERNEL32 ref: 0012E9F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: 1935afc4de01c3fdccfe32bc1e980a891f704fc0e011dea36defebf1d46fa746
                                                • Instruction ID: 424b2878ce6d68d5f28f374a3464f64698d356b7b3d6766036641e7a4be95276
                                                • Opcode Fuzzy Hash: 1935afc4de01c3fdccfe32bc1e980a891f704fc0e011dea36defebf1d46fa746
                                                • Instruction Fuzzy Hash: 07D0C976394310BAE668BB70AC1FFC67A549B10B15F0049167645AA1D0DAA0A8818A94
                                                APIs
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0015236C
                                                • PostMessageW.USER32(00000000), ref: 00152373
                                                  • Part of subcall function 0012E97B: Sleep.KERNEL32 ref: 0012E9F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: a9f7162eb8017c5aecdb6bd7b56444f46da331ef866de92bcd4859ca1594ba94
                                                • Instruction ID: 3665c2c9e7e03b31a58c0e280893813c81cebe220cc8f8a6cc2793fe9b8246c7
                                                • Opcode Fuzzy Hash: a9f7162eb8017c5aecdb6bd7b56444f46da331ef866de92bcd4859ca1594ba94
                                                • Instruction Fuzzy Hash: 88D0C9723D1310BEE668BB70AC1FFC676549B14B15F4049167645AA1D0DAA0A8818A94
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 000FBE93
                                                • GetLastError.KERNEL32 ref: 000FBEA1
                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 000FBEFC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1755056882.00000000000C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 000C0000, based on PE: true
                                                • Associated: 00000000.00000002.1755038060.00000000000C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.0000000000182000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000018C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.000000000019A000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755056882.00000000001E7000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755245875.00000000001ED000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1755265673.00000000001EE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_c0000_xom6WSISuh.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$ErrorLast
                                                • String ID:
                                                • API String ID: 1717984340-0
                                                • Opcode ID: 7ea89eafef56f0bd70ae3cc4e3c041059ac361ccd8ce3e2a506c416288021723
                                                • Instruction ID: 0404d657a9bc5467b117c5579d690e834103ce724a262660a2ed0071fd0dcaa7
                                                • Opcode Fuzzy Hash: 7ea89eafef56f0bd70ae3cc4e3c041059ac361ccd8ce3e2a506c416288021723
                                                • Instruction Fuzzy Hash: 4641C13460420AEFCB718F65CC44ABA7BE5EF41320F294169FA599B5A2DB318D04EF60