Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
UF7jzc7ETP.exe

Overview

General Information

Sample name:UF7jzc7ETP.exe
renamed because original name is a hash value
Original sample name:f232220fdf23a7eb11d3a20c989fd8f4db2cbc4bff1ecdaf05ffccbb0efce49b.exe
Analysis ID:1588211
MD5:84271c44d2e9f203b8e21364c2c0a235
SHA1:cfc39b474fd8d0301308fedaffb43574ba1a7f14
SHA256:f232220fdf23a7eb11d3a20c989fd8f4db2cbc4bff1ecdaf05ffccbb0efce49b
Tags:exeSnakeKeyloggeruser-adrian__luca
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • UF7jzc7ETP.exe (PID: 7344 cmdline: "C:\Users\user\Desktop\UF7jzc7ETP.exe" MD5: 84271C44D2E9F203B8E21364C2C0A235)
    • RegSvcs.exe (PID: 7360 cmdline: "C:\Users\user\Desktop\UF7jzc7ETP.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "Telegram", "Telegram Token": "7277445290:AAGPMfh-7hOfYQqkToVnhbp-yTYEzy9NhGk", "Telegram Chatid": "5557063310"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xeed7:$a1: get_encryptedPassword
        • 0xf1ff:$a2: get_encryptedUsername
        • 0xec72:$a3: get_timePasswordChanged
        • 0xed93:$a4: get_passwordField
        • 0xeeed:$a5: set_encryptedPassword
        • 0x1084b:$a7: get_logins
        • 0x104fc:$a8: GetOutlookPasswords
        • 0x102ee:$a9: StartKeylogger
        • 0x1079b:$a10: KeyLoggerEventArgs
        • 0x1034b:$a11: KeyLoggerEventArgsEventHandler
        00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          Click to see the 13 entries
          SourceRuleDescriptionAuthorStrings
          0.2.UF7jzc7ETP.exe.3de0000.1.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            0.2.UF7jzc7ETP.exe.3de0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.UF7jzc7ETP.exe.3de0000.1.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                0.2.UF7jzc7ETP.exe.3de0000.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xd2d7:$a1: get_encryptedPassword
                • 0xd5ff:$a2: get_encryptedUsername
                • 0xd072:$a3: get_timePasswordChanged
                • 0xd193:$a4: get_passwordField
                • 0xd2ed:$a5: set_encryptedPassword
                • 0xec4b:$a7: get_logins
                • 0xe8fc:$a8: GetOutlookPasswords
                • 0xe6ee:$a9: StartKeylogger
                • 0xeb9b:$a10: KeyLoggerEventArgs
                • 0xe74b:$a11: KeyLoggerEventArgsEventHandler
                0.2.UF7jzc7ETP.exe.3de0000.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x1228d:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x1178b:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x11a99:$a4: \Orbitum\User Data\Default\Login Data
                • 0x12891:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 10 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-10T22:41:44.426183+010028032742Potentially Bad Traffic192.168.2.449730132.226.8.16980TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000001.00000002.2948623327.0000000002C61000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7277445290:AAGPMfh-7hOfYQqkToVnhbp-yTYEzy9NhGk", "Telegram Chatid": "5557063310"}
                Source: UF7jzc7ETP.exeReversingLabs: Detection: 82%
                Source: UF7jzc7ETP.exeVirustotal: Detection: 53%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: UF7jzc7ETP.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: UF7jzc7ETP.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49731 version: TLS 1.0
                Source: Binary string: wntdll.pdbUGP source: UF7jzc7ETP.exe, 00000000.00000003.1705345550.0000000004170000.00000004.00001000.00020000.00000000.sdmp, UF7jzc7ETP.exe, 00000000.00000003.1705553948.0000000004310000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: UF7jzc7ETP.exe, 00000000.00000003.1705345550.0000000004170000.00000004.00001000.00020000.00000000.sdmp, UF7jzc7ETP.exe, 00000000.00000003.1705553948.0000000004310000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F3445A
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3C6D1 FindFirstFileW,FindClose,0_2_00F3C6D1
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00F3C75C
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F3EF95
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F3F0F2
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F3F3F3
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F337EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F337EF
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F33B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F33B12
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F3BCBC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01019731h1_2_01019480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01019E5Ah1_2_01019A40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01019E5Ah1_2_01019A30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01019E5Ah1_2_01019D87
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49730 -> 132.226.8.169:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.4:49731 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F422EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00F422EE
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: RegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: RegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2948623327.0000000002CCE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegSvcs.exe, 00000001.00000002.2948623327.0000000002C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: RegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: UF7jzc7ETP.exe, 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: RegSvcs.exe, 00000001.00000002.2948623327.0000000002CFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: RegSvcs.exe, 00000001.00000002.2948623327.0000000002CFD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: RegSvcs.exe, 00000001.00000002.2948623327.0000000002C61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: UF7jzc7ETP.exe, 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: RegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: UF7jzc7ETP.exe, 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: RegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                Source: RegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F44164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00F44164
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F44164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00F44164
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F43F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00F43F66
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00F3001C
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F5CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00F5CABC

                System Summary

                barindex
                Source: 0.2.UF7jzc7ETP.exe.3de0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.UF7jzc7ETP.exe.3de0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.UF7jzc7ETP.exe.3de0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.UF7jzc7ETP.exe.3de0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: Process Memory Space: UF7jzc7ETP.exe PID: 7344, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegSvcs.exe PID: 7360, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: This is a third-party compiled AutoIt script.0_2_00ED3B3A
                Source: UF7jzc7ETP.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: UF7jzc7ETP.exe, 00000000.00000000.1696341792.0000000000F84000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_286c0a46-3
                Source: UF7jzc7ETP.exe, 00000000.00000000.1696341792.0000000000F84000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_fdf750a3-d
                Source: UF7jzc7ETP.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_eb28e4a0-4
                Source: UF7jzc7ETP.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_9fe83595-b
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00F3A1EF
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F28310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00F28310
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F351BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00F351BD
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EFD9750_2_00EFD975
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EF21C50_2_00EF21C5
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F062D20_2_00F062D2
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F503DA0_2_00F503DA
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F0242E0_2_00F0242E
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EF25FA0_2_00EF25FA
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EE66E10_2_00EE66E1
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EDE6A00_2_00EDE6A0
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F2E6160_2_00F2E616
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F0878F0_2_00F0878F
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F388890_2_00F38889
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F508570_2_00F50857
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F068440_2_00F06844
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EE88080_2_00EE8808
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EFCB210_2_00EFCB21
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F06DB60_2_00F06DB6
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EE6F9E0_2_00EE6F9E
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EE30300_2_00EE3030
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EFF1D90_2_00EFF1D9
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EF31870_2_00EF3187
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00ED12870_2_00ED1287
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EF14840_2_00EF1484
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EE55200_2_00EE5520
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EF76960_2_00EF7696
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EE57600_2_00EE5760
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EF19780_2_00EF1978
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F09AB50_2_00F09AB5
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EDFCE00_2_00EDFCE0
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F57DDB0_2_00F57DDB
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EFBDA60_2_00EFBDA6
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EF1D900_2_00EF1D90
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EE3FE00_2_00EE3FE0
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EDDF000_2_00EDDF00
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_017EC9500_2_017EC950
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0101C5301_2_0101C530
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_010127B91_2_010127B9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_010194801_2_01019480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0101C5211_2_0101C521
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_01012DD11_2_01012DD1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0101946F1_2_0101946F
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: String function: 00EF0AE3 appears 70 times
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: String function: 00ED7DE1 appears 35 times
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: String function: 00EF8900 appears 42 times
                Source: UF7jzc7ETP.exe, 00000000.00000003.1707027811.000000000443D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs UF7jzc7ETP.exe
                Source: UF7jzc7ETP.exe, 00000000.00000003.1707548667.0000000004293000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs UF7jzc7ETP.exe
                Source: UF7jzc7ETP.exe, 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs UF7jzc7ETP.exe
                Source: UF7jzc7ETP.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 0.2.UF7jzc7ETP.exe.3de0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.UF7jzc7ETP.exe.3de0000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.UF7jzc7ETP.exe.3de0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.UF7jzc7ETP.exe.3de0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: Process Memory Space: UF7jzc7ETP.exe PID: 7344, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegSvcs.exe PID: 7360, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@2/2
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3A06A GetLastError,FormatMessageW,0_2_00F3A06A
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F281CB AdjustTokenPrivileges,CloseHandle,0_2_00F281CB
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F287E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00F287E1
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3B3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00F3B3FB
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F4EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00F4EE0D
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F483BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00F483BB
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00ED4E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00ED4E89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeFile created: C:\Users\user\AppData\Local\Temp\autECA5.tmpJump to behavior
                Source: UF7jzc7ETP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegSvcs.exe, 00000001.00000002.2948623327.0000000002D5E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2948623327.0000000002D40000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2948623327.0000000002D50000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: UF7jzc7ETP.exeReversingLabs: Detection: 82%
                Source: UF7jzc7ETP.exeVirustotal: Detection: 53%
                Source: unknownProcess created: C:\Users\user\Desktop\UF7jzc7ETP.exe "C:\Users\user\Desktop\UF7jzc7ETP.exe"
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\UF7jzc7ETP.exe"
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\UF7jzc7ETP.exe"Jump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: UF7jzc7ETP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: UF7jzc7ETP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: UF7jzc7ETP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: UF7jzc7ETP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: UF7jzc7ETP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: UF7jzc7ETP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: UF7jzc7ETP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: wntdll.pdbUGP source: UF7jzc7ETP.exe, 00000000.00000003.1705345550.0000000004170000.00000004.00001000.00020000.00000000.sdmp, UF7jzc7ETP.exe, 00000000.00000003.1705553948.0000000004310000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: UF7jzc7ETP.exe, 00000000.00000003.1705345550.0000000004170000.00000004.00001000.00020000.00000000.sdmp, UF7jzc7ETP.exe, 00000000.00000003.1705553948.0000000004310000.00000004.00001000.00020000.00000000.sdmp
                Source: UF7jzc7ETP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: UF7jzc7ETP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: UF7jzc7ETP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: UF7jzc7ETP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: UF7jzc7ETP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00ED4B37 LoadLibraryA,GetProcAddress,0_2_00ED4B37
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3848F push FFFFFF8Bh; iretd 0_2_00F38491
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EFE70F push edi; ret 0_2_00EFE711
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EFE828 push esi; ret 0_2_00EFE82A
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EF8945 push ecx; ret 0_2_00EF8958
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EFEAEC push edi; ret 0_2_00EFEAEE
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EFEA03 push esi; ret 0_2_00EFEA05
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0101B3A8 push eax; iretd 1_2_0101B445
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00ED48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00ED48D7
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F55376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00F55376
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EF3187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00EF3187
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeAPI/Special instruction interceptor: Address: 17EC574
                Source: UF7jzc7ETP.exe, 00000000.00000002.1712073367.0000000001877000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCMON.EXEN
                Source: UF7jzc7ETP.exe, 00000000.00000002.1711781525.0000000001788000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: PROCESSHACKER.EXERNCBU
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-105009
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeAPI coverage: 4.7 %
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F3445A
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3C6D1 FindFirstFileW,FindClose,0_2_00F3C6D1
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00F3C75C
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F3EF95
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F3F0F2
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F3F3F3
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F337EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F337EF
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F33B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F33B12
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F3BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00F3BCBC
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00ED49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00ED49A0
                Source: RegSvcs.exe, 00000001.00000002.2945457083.0000000000D7F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeAPI call chain: ExitProcess graph end nodegraph_0-103631
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F43F09 BlockInput,0_2_00F43F09
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00ED3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00ED3B3A
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F05A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00F05A7C
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00ED4B37 LoadLibraryA,GetProcAddress,0_2_00ED4B37
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_017EB190 mov eax, dword ptr fs:[00000030h]0_2_017EB190
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_017EC7E0 mov eax, dword ptr fs:[00000030h]0_2_017EC7E0
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_017EC840 mov eax, dword ptr fs:[00000030h]0_2_017EC840
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F280A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_00F280A9
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EFA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00EFA155
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EFA124 SetUnhandledExceptionFilter,0_2_00EFA124
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: B61008Jump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F287B1 LogonUserW,0_2_00F287B1
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00ED3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00ED3B3A
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00ED48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00ED48D7
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F34C7F mouse_event,0_2_00F34C7F
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\UF7jzc7ETP.exe"Jump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F27CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00F27CAF
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F2874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00F2874B
                Source: UF7jzc7ETP.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: UF7jzc7ETP.exeBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00EF862B cpuid 0_2_00EF862B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F04E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00F04E87
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F11E06 GetUserNameW,0_2_00F11E06
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F03F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00F03F3A
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00ED49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00ED49A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: UF7jzc7ETP.exe, 00000000.00000002.1712073367.0000000001877000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcupdate.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.UF7jzc7ETP.exe.3de0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UF7jzc7ETP.exe.3de0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: UF7jzc7ETP.exe PID: 7344, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7360, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.UF7jzc7ETP.exe.3de0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UF7jzc7ETP.exe.3de0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: UF7jzc7ETP.exe PID: 7344, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7360, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: UF7jzc7ETP.exeBinary or memory string: WIN_81
                Source: UF7jzc7ETP.exeBinary or memory string: WIN_XP
                Source: UF7jzc7ETP.exeBinary or memory string: WIN_XPe
                Source: UF7jzc7ETP.exeBinary or memory string: WIN_VISTA
                Source: UF7jzc7ETP.exeBinary or memory string: WIN_7
                Source: UF7jzc7ETP.exeBinary or memory string: WIN_8
                Source: UF7jzc7ETP.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                Source: Yara matchFile source: 0.2.UF7jzc7ETP.exe.3de0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UF7jzc7ETP.exe.3de0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2948623327.0000000002D85000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: UF7jzc7ETP.exe PID: 7344, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7360, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.UF7jzc7ETP.exe.3de0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UF7jzc7ETP.exe.3de0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: UF7jzc7ETP.exe PID: 7344, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7360, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.UF7jzc7ETP.exe.3de0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.UF7jzc7ETP.exe.3de0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: UF7jzc7ETP.exe PID: 7344, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7360, type: MEMORYSTR
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F46283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00F46283
                Source: C:\Users\user\Desktop\UF7jzc7ETP.exeCode function: 0_2_00F46747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00F46747
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                2
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                Valid Accounts
                3
                Obfuscated Files or Information
                Security Account Manager1
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                DLL Side-Loading
                NTDS127
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                2
                Valid Accounts
                LSA Secrets241
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                Access Token Manipulation
                Cached Domain Credentials2
                Process Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items212
                Process Injection
                DCSync1
                Application Window Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                System Owner/User Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                System Network Configuration Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                UF7jzc7ETP.exe83%ReversingLabsWin32.Trojan.AutoitInject
                UF7jzc7ETP.exe54%VirustotalBrowse
                UF7jzc7ETP.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                104.21.48.1
                truefalse
                  high
                  checkip.dyndns.com
                  132.226.8.169
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                        high
                        https://reallyfreegeoip.org/xml/8.46.123.189false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://reallyfreegeoip.org/xml/8.46.123.189lRegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.comdRegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://checkip.dyndns.org/qUF7jzc7ETP.exe, 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgdRegSvcs.exe, 00000001.00000002.2948623327.0000000002CFD000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/8.46.123.189dRegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.2948623327.0000000002CFD000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.orgdRegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://reallyfreegeoip.orgRegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.orgRegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2948623327.0000000002CCE000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.comRegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://checkip.dyndns.org/dRegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.2948623327.0000000002C61000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.telegram.org/bot-/sendDocument?chat_id=UF7jzc7ETP.exe, 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    high
                                                    https://reallyfreegeoip.org/xml/UF7jzc7ETP.exe, 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2948623327.0000000002CE0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      132.226.8.169
                                                      checkip.dyndns.comUnited States
                                                      16989UTMEMUSfalse
                                                      104.21.48.1
                                                      reallyfreegeoip.orgUnited States
                                                      13335CLOUDFLARENETUSfalse
                                                      Joe Sandbox version:42.0.0 Malachite
                                                      Analysis ID:1588211
                                                      Start date and time:2025-01-10 22:40:47 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 5m 49s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:6
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:UF7jzc7ETP.exe
                                                      renamed because original name is a hash value
                                                      Original Sample Name:f232220fdf23a7eb11d3a20c989fd8f4db2cbc4bff1ecdaf05ffccbb0efce49b.exe
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.evad.winEXE@3/4@2/2
                                                      EGA Information:
                                                      • Successful, ratio: 50%
                                                      HCA Information:
                                                      • Successful, ratio: 100%
                                                      • Number of executed functions: 59
                                                      • Number of non-executed functions: 274
                                                      Cookbook Comments:
                                                      • Found application associated with file extension: .exe
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                      • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.45
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Execution Graph export aborted for target RegSvcs.exe, PID 7360 because it is empty
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                      No simulations
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      132.226.8.169V7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      FylY1FW6fl.exeGet hashmaliciousMassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      ppISxhDcpF.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      CvzLvta2bG.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • checkip.dyndns.org/
                                                      xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • checkip.dyndns.org/
                                                      3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      fiyati_teklif 65TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      104.21.48.1NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                                      • www.axis138ae.shop/j2vs/
                                                      SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                      • twirpx.org/administrator/index.php
                                                      SN500, SN150 Spec.exeGet hashmaliciousFormBookBrowse
                                                      • www.antipromil.site/7ykh/
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      reallyfreegeoip.org9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.32.1
                                                      VQsnGWaNi5.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.48.1
                                                      6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.80.1
                                                      JgE2YgxSzB.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.16.1
                                                      lsc5QN46NH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.80.1
                                                      V7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.32.1
                                                      upXUt2jZ0S.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.48.1
                                                      2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.16.1
                                                      6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.48.1
                                                      SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.64.1
                                                      checkip.dyndns.com9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.247.73
                                                      VQsnGWaNi5.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 193.122.130.0
                                                      6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.247.73
                                                      JgE2YgxSzB.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 132.226.247.73
                                                      lsc5QN46NH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 193.122.130.0
                                                      V7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.8.169
                                                      upXUt2jZ0S.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 132.226.247.73
                                                      2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.247.73
                                                      6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.247.73
                                                      SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 158.101.44.242
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      CLOUDFLARENETUS9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.32.1
                                                      VQsnGWaNi5.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.48.1
                                                      6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.80.1
                                                      http://@1800-web.com/new/auth/6XEcGVvsnjwXq8bbJloqbuPkeuHjc6rLcgYUe/bGVvbi5ncmF2ZXNAYXRvcy5uZXQ=Get hashmaliciousUnknownBrowse
                                                      • 104.17.25.14
                                                      JgE2YgxSzB.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.16.1
                                                      87J30ulb4q.exeGet hashmaliciousUnknownBrowse
                                                      • 104.21.96.1
                                                      lsc5QN46NH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.80.1
                                                      V7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.32.1
                                                      https://services221.com/mm/Get hashmaliciousHTMLPhisherBrowse
                                                      • 104.17.25.14
                                                      https://atpscan.global.hornetsecurity.com/?d=W3rdHn1Og9hhUJnVJzqWF36wMmxswAZldvtx3E21ybg&f=v8m9AqGfgV2Ri7cjqmfsuyl2V2Mu_lVW0BRsqcFw4upagWAQ1C-MqANvN6gf4zNV&i=&k=xREg&m=b_ORYMkPffImCXbCPli-aiR7Ga6rGe55sar2xtigCL4MrowDPSzt7ABKETTGxzegakAfoZ57KD02aVix8V8TVmZ2VcxzjeybXYrPiS2SB73LCKYktj5jv2aw6VcPRslz&n=s4crRkyHC4bab6S3yrgn1E3n-VmdqgfSqNiaCJyPrf6hnyL_SE4PHEo5SUcwwsFGV6rnB35iQFM5FLsE91obvZ0HTAEiqHnB8ROLzY5JVgg&r=oMs_cp4DXIjeQhcPWsPLyR3_oxBVUN4Iok_tSVE4DNNtzqeot7ZzvdXkh4vatwpC&s=bd82eb507a358fd35f72f18b86e67f3bfc1ce64bbeab0c01d700897b1b678efb&u=https%3A%2F%2Fe.trustifi.com%2F%23%2Ffff2af%2F32054d%2F67960f%2Fee6fed%2F5d1d11%2F46c760%2Ff79190%2Fc5ec40%2Fe8666a%2Fef542d%2F85972d%2F627493%2F9a11d6%2F1f4096%2F1d247f%2F818e78%2Fc53383%2Fd59aa0%2Fedfa57%2F7914c7%2Fc38cf6%2Ff74f56%2Ff45915%2F39dbbd%2Ff48710%2F1ddf22%2F37d5f2%2F9de9f7%2F96109e%2F882355%2F854b66%2F9d606d%2F2d0447%2Fad3b01%2F637d1c%2F3c0f2b%2F606f48%2Fa6d904%2F8fefe3%2F00a4bb%2F6520c6%2F9b795c%2Fb7de1a%2Fb5dde6%2F3f5692%2F997c7d%2Fc00925%2F782cce%2F511459%2Fab5aa8%2F91722a%2Feec933%2F3f4f91%2F894088%2F43adfa%2Fb78195%2F0407d0%2F56f022%2Fddf20e%2F946567%2Faa271a%2F507b7a%2Faccd06%2F50d63c%2F485c4b%2F07ced8%2Fd0ec21%2F260ce6%2Fb5edbb%2F79a81e%2F1fd160%2Ff4da41%2F7073e0%2F8a5e9a%2Fdac829%2F521e52%2Fa1a847%2F13ea63%2Fabb5a3%2Fe1901e%2Fd876f6%2F7b0bf4%2Fbd19df%2F89bdcd%2F1874d8%2F0fb7f3%2F72f438%2Fa098c5%2F4e2214%2F4b6e54%2F0c4a8fGet hashmaliciousHTMLPhisherBrowse
                                                      • 104.17.25.14
                                                      UTMEMUS9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.247.73
                                                      6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.247.73
                                                      JgE2YgxSzB.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 132.226.247.73
                                                      V7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.8.169
                                                      upXUt2jZ0S.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 132.226.247.73
                                                      2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.247.73
                                                      6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.247.73
                                                      oEQp0EklDb.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 132.226.247.73
                                                      FylY1FW6fl.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 132.226.8.169
                                                      v4nrZtP7K2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.8.169
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      54328bd36c14bd82ddaa0c04b25ed9ad9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.48.1
                                                      VQsnGWaNi5.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.48.1
                                                      6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.48.1
                                                      JgE2YgxSzB.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.48.1
                                                      lsc5QN46NH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.48.1
                                                      V7OHj6ISEo.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.48.1
                                                      upXUt2jZ0S.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.48.1
                                                      2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.48.1
                                                      6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 104.21.48.1
                                                      SABXJ1B5c8.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.48.1
                                                      No context
                                                      Process:C:\Users\user\Desktop\UF7jzc7ETP.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):61330
                                                      Entropy (8bit):7.869465492012193
                                                      Encrypted:false
                                                      SSDEEP:1536:7nfrenrjMEoxHAwBXlrBb+SkENxEndkRqgGtYZ37mDPgaf6AP:Tfa/MEitVlrBb+SfEniRqgH3uZf
                                                      MD5:64A2E0190B63F961A3C4CF7C27B1C52A
                                                      SHA1:FFBB86CE84B4D5F38A907F5A046CD3D9E120B4AC
                                                      SHA-256:A66985ED039BE91D09A4D68790AD03DBDAA425641A708F07E4D89DE6C8F5D078
                                                      SHA-512:6344F8660782F95300D8B172A7B6A2A285C401C0EFDD548AD1DAE037DD9BB380428FECD4DAB7295426885380AFB9E1446DFC94842F4E417590B275BA68060288
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:EA06..l...5...J.I.R....6.X.Rh59..qQ......B.2..+......|[`.BoM.Q....r..E2....1.His...'.L.....Yi....l.3;.Zn.X=.I]..n.Jef$....>.Q...L....d.B.V.P.pz.bW@..@...r...LH.....+.Fsr..).J.4.33...j......&.*.RsR.Rf...F.X.V@21)....m@..@........x|..F......}.....S....q.(..{$......I.Z....Z.X..(|6..^qv..5P.C.W..=@....@....>.L...N...qQ..Zd.....|...O....PW..BwR..i.z.Fs...+`....8..s.JN ......*.....Z..........R..+....Q.....f+...B&.(U......7..$...H.P......B..(M......e..:.2.....-B.V.7.T.#J.V.3:.b.:.....NsR.N.`....Q...5P.F*.(.....n.5.K..~M...)3.M6.I..#.I.N#k.RgT....Sv..Os[. ,.).ReW.\!t...m1..j.J..P......b.K..'....o....-&eS..,v9l..8..V.]:..PFj.+..S.Q.u..R.+.N;..M..7..h5X..qQ.....2.{..5j.&.Q........0.A.}..$...Z1U.=..0.T....^.s...Sj.._?.Q)3i..I.\...M.......+v.ab...Q@...u..j.K...T..cQ..b.A..x...,...~3*.J.c....FsX.R.s{.F.6..$.:.Neh.Tgr.E&aN.Mi3*...a.......l.L)U...".P8 ....R.m..F.0.Ic@...E....=.*...I............d^.0.J`.%.j.4....,....L)U[.gN.HXr.7.....buJ."/N.q91...OK..@i.P..6..
                                                      Process:C:\Users\user\Desktop\UF7jzc7ETP.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):14604
                                                      Entropy (8bit):7.625423479113949
                                                      Encrypted:false
                                                      SSDEEP:384:ITYznw6siKOPIyznfvWME9lMYIWy7HKNr:IAw6si7nfvWL8m
                                                      MD5:94E38DAB49785FF2CC4FAFE9D444D6B4
                                                      SHA1:535F1CA4DCC1F03B79F5CFFD3CB72D2074238410
                                                      SHA-256:23977A8B2374B54EF05B8F83BFED14A508354D0C9A8CF096B3CC1047CBDF0DDF
                                                      SHA-512:E4DEBDB5D7943325F33F244B50C4DA605105243B8D2901DB6CDD103D16FBD8F59376B52801BEC9EF1F7B8B0DE12568EFC79637178FD7715F132A37BD462ECE9D
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:EA06..0..[.....+x..f....... .V......71...@.x..L.......*.`......8............`.......Z|3@...@.........K.X@0.2.Z..Z>)..w.e....l !..m..;...| !.....;....;.....l.;.0./.<.;...m..rd.....@->.....4....f.C.5..;.............r.....X.<>`.O..p.........!.........h.=..........<|3.....c...h.. -...... ...X.Z?......(...(.G..4.h....x....M@N.......Z?.I.......N@R... ...5.(..,.._...k`........R...._.K..?d...B.... 7W.......n.../.~.....)...@...!K....h|!._....ga._.5.1.....`v/.......NA*...,...7.7.,..!6.b...Z?.K(-...0.h..&.._....' -.............-..........G.6.....d_.T......"....d_.(M..57....n.....`...L....K.L..6.s.A.?..L.......Bg>...w.36.... !...L...}....|V.4..r......$............r..9....>.....2... ...b....`......k.(.....!`....,......V1`..f....X.>i.v'.3c.........G.4....E.?......9..X.......7...l.`..."...\.61*........f.....|.`.O.......,`........nl,....C.`....p...Y......`....@n?..;g....0...d...l ...P.?'....}...........0...4.X...>y.....1......x...L.\.i.....)...@n?............b...@.>y...
                                                      Process:C:\Users\user\Desktop\UF7jzc7ETP.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):93184
                                                      Entropy (8bit):6.845898413962198
                                                      Encrypted:false
                                                      SSDEEP:1536:4Vc1E0rCKZA8D4154uV9UwLxWzEGN1UXd4pNYwhVkidZLXM7FII61KfK48H7ewZe:N1341wAzGFZwEj/9lvu
                                                      MD5:148E15087BBE2023648303A7F8E301CC
                                                      SHA1:CE961FA056E006B98A1B55E07F4B2D16E55C1B3F
                                                      SHA-256:FFBF464B66A5A6AD6F184B82C853588652941F7E0C53096242EA1FC6C23DBBC1
                                                      SHA-512:DE5F11F5F319952652E31A773F236E9AB8B71EBFFE28AF16B03CE71BF4369BF7371BF774D8B294279F9C105DB503501BC9915F07107E83C8A3ACAD09297106ED
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:{..Q:RDI4JTQ..WX.IAS6B8QyRDI0JTQI2WXXIAS6B8Q9RDI0JTQI2WXXIAS.B8Q7M.G0.].h.V..h.;_1.!K=#;Q't2(\97,i#6.0M?.;*it..q$]3=vDLY.B8Q9RDI`.TQ.3TX.'..6B8Q9RDI.JVPB3.XX+@S6J8Q9RDI..UQI.WXX.@S6BxQ9rDI0HTQM2WXXIAS0B8Q9RDI0.UQI0WXXIAS4BX.9RTI0ZTQI2GXXYAS6B8Q)RDI0JTQI2WX.6@SyB8Q9.EI.OTQI2WXXIAS6B8Q9RDI0.UQE2WXXIAS6B8Q9RDI0JTQI2WXXIAS6B8Q9RDI0JTQI2WXXIAS6B8Q9rDI8JTQI2WXXIAS>b8QqRDI0JTQI2WXv=$+BB8Q}2EI0jTQIPVXXKAS6B8Q9RDI0JTQi2W8v;2!UB8Q.WDI0.UQI4WXX-@S6B8Q9RDI0JTQ.2W.v;$?Y!8Q5RDI0.UQI0WXX#@S6B8Q9RDI0JTQ.2W.XIAS6B8Q9RDI0JTQi.VXXIAS~B8Q;RAIL.TQ9.WX[IASlB8W..DI.JTQI2WXXIAS6B8Q9RDI0JTQI2WXXIAS6B8Q9RDI0JTQ.O.W...:E..Q9RDI0KVRM4_PXIAS6B8QGRDIvJTQ.2WXoIAS.B8QTRDI.JTQ72WX&IASRB8QKRDIQJTQ.2WX7IASXB8QGRDI.H|NI2]r~IC{.B8[9x.:.JT[.3WX\:cS6H.S9R@:.JT[.1WX\:eS6H.U9R@:.JT[.7WX\c.S5..W9R_&.JT[I1.M^IAH.d8S.kDI:J~wI1.M^IAH.`8S.[DI4`."T2W^p.AS<61Q9P.C0JP{W0..XIKy.<+Q9VoI.h*EI2SsXcc-#B8U.RnkN\TQM.Wrz7VS6F.Q.Tn+08.]IBT79IAU..8Q3z.I0LT{s2)VXIEQY.8Q3tns0b.QI4Wp.IAU6h.QGaDI4fS/z2W\s_?b6B<.?*DI69.QI8r.kIAW..8Q3Rn.0b.QI4Wp.IAU
                                                      Process:C:\Users\user\Desktop\UF7jzc7ETP.exe
                                                      File Type:ASCII text, with very long lines (65536), with no line terminators
                                                      Category:dropped
                                                      Size (bytes):143378
                                                      Entropy (8bit):2.993257378900886
                                                      Encrypted:false
                                                      SSDEEP:96:AIXLr44+F05BDKoPH70FlkvjA6/c8vGcu29IwyJuv35rWVjjYqnBaAJZdjureb3T:H3Ljwk6wGcu29IwyJuv35rWVgqnBaA
                                                      MD5:CDDED546A8CE05B0FB40E59661D1B353
                                                      SHA1:32B42112FC93507FD9B01CF233911C0EF44B76ED
                                                      SHA-256:3B5E8D7932DDB8359078B3C51D60C2ABCC6CF981867398D4F9B9FF1DA7E04728
                                                      SHA-512:35B812AF354DE5C0C3E96883D3EBAEEAAB6B07CDB1E66DA87F93A712C64D3EEC419F440C0E951F938F2F6637412E6807700F9CAEF6C89B67D390DA2CA682EA44
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:dowp0dowpxdowp5dowp5dowp8dowpbdowpedowpcdowp8dowp1dowpedowpcdowpcdowpcdowp0dowp2dowp0dowp0dowp0dowp0dowp5dowp6dowp5dowp7dowpbdowp8dowp6dowpbdowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp4dowp5dowp8dowp4dowpbdowp9dowp6dowp5dowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp4dowpddowp8dowp6dowpbdowpadowp7dowp2dowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp5dowp5dowp8dowp8dowpbdowp8dowp6dowpedowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp4dowp5dowp8dowpadowpbdowp9dowp6dowp5dowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp4dowpddowp8dowpcdowpbdowpadowp6dowpcdowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp5dowp5dowp8dowpedowpbdowp8dowp3dowp3dowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp4dowp5dowp9dowp0dowpbdowp9dowp3dowp2dowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp4dowpddowp9dowp2dowpbdowpadowp2dowpedowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9dowp5dowp5dowp9dowp4dowpbdowp8dowp6dowp4dowp0dowp0dowp0dowp0dowp0dowp0dowp6dowp6dowp8dowp9
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):6.853828482825834
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:UF7jzc7ETP.exe
                                                      File size:969'216 bytes
                                                      MD5:84271c44d2e9f203b8e21364c2c0a235
                                                      SHA1:cfc39b474fd8d0301308fedaffb43574ba1a7f14
                                                      SHA256:f232220fdf23a7eb11d3a20c989fd8f4db2cbc4bff1ecdaf05ffccbb0efce49b
                                                      SHA512:0434d6457c21fdfac19e8500644761f35721e147569394677fc66fa1d933a752b38db839c4ab09fcb6e87b8624d85d68e56dd9f384efd0157254c3a8ec8105d0
                                                      SSDEEP:24576:Ku6J33O0c+JY5UZ+XC0kGso6FaJc7N2a0nWY:8u0c++OCvkGs9FaJG2azY
                                                      TLSH:4625AE2273DDC360CB669173BF6AB7016EBF3C610630B95B2F980D7DA950162162D7A3
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                                                      Icon Hash:aaf3e3e3938382a0
                                                      Entrypoint:0x427dcd
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x6757BF40 [Tue Dec 10 04:10:40 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:1
                                                      File Version Major:5
                                                      File Version Minor:1
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:1
                                                      Import Hash:afcdf79be1557326c854b6e20cb900a7
                                                      Instruction
                                                      call 00007FD7ED2984FAh
                                                      jmp 00007FD7ED28B2C4h
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      push edi
                                                      push esi
                                                      mov esi, dword ptr [esp+10h]
                                                      mov ecx, dword ptr [esp+14h]
                                                      mov edi, dword ptr [esp+0Ch]
                                                      mov eax, ecx
                                                      mov edx, ecx
                                                      add eax, esi
                                                      cmp edi, esi
                                                      jbe 00007FD7ED28B44Ah
                                                      cmp edi, eax
                                                      jc 00007FD7ED28B7AEh
                                                      bt dword ptr [004C31FCh], 01h
                                                      jnc 00007FD7ED28B449h
                                                      rep movsb
                                                      jmp 00007FD7ED28B75Ch
                                                      cmp ecx, 00000080h
                                                      jc 00007FD7ED28B614h
                                                      mov eax, edi
                                                      xor eax, esi
                                                      test eax, 0000000Fh
                                                      jne 00007FD7ED28B450h
                                                      bt dword ptr [004BE324h], 01h
                                                      jc 00007FD7ED28B920h
                                                      bt dword ptr [004C31FCh], 00000000h
                                                      jnc 00007FD7ED28B5EDh
                                                      test edi, 00000003h
                                                      jne 00007FD7ED28B5FEh
                                                      test esi, 00000003h
                                                      jne 00007FD7ED28B5DDh
                                                      bt edi, 02h
                                                      jnc 00007FD7ED28B44Fh
                                                      mov eax, dword ptr [esi]
                                                      sub ecx, 04h
                                                      lea esi, dword ptr [esi+04h]
                                                      mov dword ptr [edi], eax
                                                      lea edi, dword ptr [edi+04h]
                                                      bt edi, 03h
                                                      jnc 00007FD7ED28B453h
                                                      movq xmm1, qword ptr [esi]
                                                      sub ecx, 08h
                                                      lea esi, dword ptr [esi+08h]
                                                      movq qword ptr [edi], xmm1
                                                      lea edi, dword ptr [edi+08h]
                                                      test esi, 00000007h
                                                      je 00007FD7ED28B4A5h
                                                      bt esi, 03h
                                                      jnc 00007FD7ED28B4F8h
                                                      Programming Language:
                                                      • [ASM] VS2013 build 21005
                                                      • [ C ] VS2013 build 21005
                                                      • [C++] VS2013 build 21005
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [IMP] VS2008 SP1 build 30729
                                                      • [ASM] VS2013 UPD4 build 31101
                                                      • [RES] VS2013 build 21005
                                                      • [LNK] VS2013 UPD4 build 31101
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x240b0.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0xec0000x711c.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0xc70000x240b00x24200a6e5c170458924e9e20a577e7a675884False0.8168049848615917data7.590696093482988IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0xec0000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                      RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                      RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                      RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                      RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                      RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                      RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                      RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                      RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                      RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                      RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                      RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                                                      RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                                                      RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                                                      RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                                                      RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                      RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                      RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                                                      RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                      RT_RCDATA0xcf7b80x1b378data1.000367778973807
                                                      RT_GROUP_ICON0xeab300x76dataEnglishGreat Britain0.6610169491525424
                                                      RT_GROUP_ICON0xeaba80x14dataEnglishGreat Britain1.25
                                                      RT_GROUP_ICON0xeabbc0x14dataEnglishGreat Britain1.15
                                                      RT_GROUP_ICON0xeabd00x14dataEnglishGreat Britain1.25
                                                      RT_VERSION0xeabe40xdcdataEnglishGreat Britain0.6181818181818182
                                                      RT_MANIFEST0xeacc00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                      DLLImport
                                                      WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                                                      VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                      MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                                      WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                                                      PSAPI.DLLGetProcessMemoryInfo
                                                      IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                                      USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                                                      UxTheme.dllIsThemeActive
                                                      KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                                                      USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                                                      GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                                                      COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                                                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                                                      SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                                                      OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishGreat Britain
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2025-01-10T22:41:44.426183+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730132.226.8.16980TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 10, 2025 22:41:43.212487936 CET4973080192.168.2.4132.226.8.169
                                                      Jan 10, 2025 22:41:43.217457056 CET8049730132.226.8.169192.168.2.4
                                                      Jan 10, 2025 22:41:43.217708111 CET4973080192.168.2.4132.226.8.169
                                                      Jan 10, 2025 22:41:43.218023062 CET4973080192.168.2.4132.226.8.169
                                                      Jan 10, 2025 22:41:43.222841024 CET8049730132.226.8.169192.168.2.4
                                                      Jan 10, 2025 22:41:44.062942982 CET8049730132.226.8.169192.168.2.4
                                                      Jan 10, 2025 22:41:44.083390951 CET4973080192.168.2.4132.226.8.169
                                                      Jan 10, 2025 22:41:44.088211060 CET8049730132.226.8.169192.168.2.4
                                                      Jan 10, 2025 22:41:44.383567095 CET8049730132.226.8.169192.168.2.4
                                                      Jan 10, 2025 22:41:44.392978907 CET49731443192.168.2.4104.21.48.1
                                                      Jan 10, 2025 22:41:44.393038034 CET44349731104.21.48.1192.168.2.4
                                                      Jan 10, 2025 22:41:44.393131971 CET49731443192.168.2.4104.21.48.1
                                                      Jan 10, 2025 22:41:44.404597044 CET49731443192.168.2.4104.21.48.1
                                                      Jan 10, 2025 22:41:44.404634953 CET44349731104.21.48.1192.168.2.4
                                                      Jan 10, 2025 22:41:44.426182985 CET4973080192.168.2.4132.226.8.169
                                                      Jan 10, 2025 22:41:44.891807079 CET44349731104.21.48.1192.168.2.4
                                                      Jan 10, 2025 22:41:44.892108917 CET49731443192.168.2.4104.21.48.1
                                                      Jan 10, 2025 22:41:44.897555113 CET49731443192.168.2.4104.21.48.1
                                                      Jan 10, 2025 22:41:44.897581100 CET44349731104.21.48.1192.168.2.4
                                                      Jan 10, 2025 22:41:44.898046970 CET44349731104.21.48.1192.168.2.4
                                                      Jan 10, 2025 22:41:44.941929102 CET49731443192.168.2.4104.21.48.1
                                                      Jan 10, 2025 22:41:44.952514887 CET49731443192.168.2.4104.21.48.1
                                                      Jan 10, 2025 22:41:44.995340109 CET44349731104.21.48.1192.168.2.4
                                                      Jan 10, 2025 22:41:45.069464922 CET44349731104.21.48.1192.168.2.4
                                                      Jan 10, 2025 22:41:45.069611073 CET44349731104.21.48.1192.168.2.4
                                                      Jan 10, 2025 22:41:45.069684029 CET49731443192.168.2.4104.21.48.1
                                                      Jan 10, 2025 22:41:45.075757980 CET49731443192.168.2.4104.21.48.1
                                                      Jan 10, 2025 22:42:49.382963896 CET8049730132.226.8.169192.168.2.4
                                                      Jan 10, 2025 22:42:49.383225918 CET4973080192.168.2.4132.226.8.169
                                                      Jan 10, 2025 22:43:24.397562027 CET4973080192.168.2.4132.226.8.169
                                                      Jan 10, 2025 22:43:24.402407885 CET8049730132.226.8.169192.168.2.4
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 10, 2025 22:41:43.164236069 CET5042653192.168.2.41.1.1.1
                                                      Jan 10, 2025 22:41:43.171276093 CET53504261.1.1.1192.168.2.4
                                                      Jan 10, 2025 22:41:44.385262012 CET6333653192.168.2.41.1.1.1
                                                      Jan 10, 2025 22:41:44.392345905 CET53633361.1.1.1192.168.2.4
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jan 10, 2025 22:41:43.164236069 CET192.168.2.41.1.1.10xda22Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                      Jan 10, 2025 22:41:44.385262012 CET192.168.2.41.1.1.10x257Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jan 10, 2025 22:41:43.171276093 CET1.1.1.1192.168.2.40xda22No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                      Jan 10, 2025 22:41:43.171276093 CET1.1.1.1192.168.2.40xda22No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 22:41:43.171276093 CET1.1.1.1192.168.2.40xda22No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 22:41:43.171276093 CET1.1.1.1192.168.2.40xda22No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 22:41:43.171276093 CET1.1.1.1192.168.2.40xda22No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 22:41:43.171276093 CET1.1.1.1192.168.2.40xda22No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 22:41:44.392345905 CET1.1.1.1192.168.2.40x257No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 22:41:44.392345905 CET1.1.1.1192.168.2.40x257No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 22:41:44.392345905 CET1.1.1.1192.168.2.40x257No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 22:41:44.392345905 CET1.1.1.1192.168.2.40x257No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 22:41:44.392345905 CET1.1.1.1192.168.2.40x257No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 22:41:44.392345905 CET1.1.1.1192.168.2.40x257No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                      Jan 10, 2025 22:41:44.392345905 CET1.1.1.1192.168.2.40x257No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                      • reallyfreegeoip.org
                                                      • checkip.dyndns.org
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.449730132.226.8.169807360C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 10, 2025 22:41:43.218023062 CET151OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                      Host: checkip.dyndns.org
                                                      Connection: Keep-Alive
                                                      Jan 10, 2025 22:41:44.062942982 CET273INHTTP/1.1 200 OK
                                                      Date: Fri, 10 Jan 2025 21:41:43 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 104
                                                      Connection: keep-alive
                                                      Cache-Control: no-cache
                                                      Pragma: no-cache
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                      Jan 10, 2025 22:41:44.083390951 CET127OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                      Host: checkip.dyndns.org
                                                      Jan 10, 2025 22:41:44.383567095 CET273INHTTP/1.1 200 OK
                                                      Date: Fri, 10 Jan 2025 21:41:44 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 104
                                                      Connection: keep-alive
                                                      Cache-Control: no-cache
                                                      Pragma: no-cache
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.449731104.21.48.14437360C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-10 21:41:44 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                      Host: reallyfreegeoip.org
                                                      Connection: Keep-Alive
                                                      2025-01-10 21:41:45 UTC859INHTTP/1.1 200 OK
                                                      Date: Fri, 10 Jan 2025 21:41:45 GMT
                                                      Content-Type: text/xml
                                                      Content-Length: 362
                                                      Connection: close
                                                      Age: 1860094
                                                      Cache-Control: max-age=31536000
                                                      cf-cache-status: HIT
                                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lBKJnpwLhluKwVqdjVn7vw1aVanAP%2Ba1FaC89dHaitwQjvGTHzGolqWLTcNd%2BQUNvXO1I%2FmKHkVcL%2F8kJ5iYPikEiOA2L0zx%2FHMyEKnbxuKkuRt2rsWhG0yoL8dnPq6NOlEkkU2M"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 8fffd53c4e3c42e9-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1756&min_rtt=1755&rtt_var=661&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1651583&cwnd=240&unsent_bytes=0&cid=fc1edd86fc058a3d&ts=193&x=0"
                                                      2025-01-10 21:41:45 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:16:41:41
                                                      Start date:10/01/2025
                                                      Path:C:\Users\user\Desktop\UF7jzc7ETP.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\UF7jzc7ETP.exe"
                                                      Imagebase:0xed0000
                                                      File size:969'216 bytes
                                                      MD5 hash:84271C44D2E9F203B8E21364C2C0A235
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000000.00000002.1712329342.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:1
                                                      Start time:16:41:42
                                                      Start date:10/01/2025
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\UF7jzc7ETP.exe"
                                                      Imagebase:0x8f0000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.2945279225.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2948623327.0000000002D85000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:3.7%
                                                        Dynamic/Decrypted Code Coverage:1.4%
                                                        Signature Coverage:5.9%
                                                        Total number of Nodes:2000
                                                        Total number of Limit Nodes:166
                                                        execution_graph 103477 ed107d 103482 ed708b 103477->103482 103479 ed108c 103513 ef2d40 103479->103513 103483 ed709b __ftell_nolock 103482->103483 103516 ed7667 103483->103516 103487 ed715a 103528 ef050b 103487->103528 103494 ed7667 59 API calls 103495 ed718b 103494->103495 103547 ed7d8c 103495->103547 103497 ed7194 RegOpenKeyExW 103498 f0e8b1 RegQueryValueExW 103497->103498 103502 ed71b6 Mailbox 103497->103502 103499 f0e943 RegCloseKey 103498->103499 103500 f0e8ce 103498->103500 103499->103502 103512 f0e955 _wcscat Mailbox __wsetenvp 103499->103512 103551 ef0db6 103500->103551 103502->103479 103503 f0e8e7 103561 ed522e 103503->103561 103504 ed79f2 59 API calls 103504->103512 103507 f0e90f 103564 ed7bcc 103507->103564 103509 f0e929 103509->103499 103511 ed3f74 59 API calls 103511->103512 103512->103502 103512->103504 103512->103511 103573 ed7de1 103512->103573 103638 ef2c44 103513->103638 103515 ed1096 103517 ef0db6 Mailbox 59 API calls 103516->103517 103518 ed7688 103517->103518 103519 ef0db6 Mailbox 59 API calls 103518->103519 103520 ed7151 103519->103520 103521 ed4706 103520->103521 103577 f01940 103521->103577 103524 ed7de1 59 API calls 103525 ed4739 103524->103525 103579 ed4750 103525->103579 103527 ed4743 Mailbox 103527->103487 103529 f01940 __ftell_nolock 103528->103529 103530 ef0518 GetFullPathNameW 103529->103530 103531 ef053a 103530->103531 103532 ed7bcc 59 API calls 103531->103532 103533 ed7165 103532->103533 103534 ed7cab 103533->103534 103535 ed7cbf 103534->103535 103536 f0ed4a 103534->103536 103601 ed7c50 103535->103601 103606 ed8029 103536->103606 103539 ed7173 103541 ed3f74 103539->103541 103540 f0ed55 __wsetenvp _memmove 103542 ed3f82 103541->103542 103546 ed3fa4 _memmove 103541->103546 103545 ef0db6 Mailbox 59 API calls 103542->103545 103543 ef0db6 Mailbox 59 API calls 103544 ed3fb8 103543->103544 103544->103494 103545->103546 103546->103543 103548 ed7da6 103547->103548 103550 ed7d99 103547->103550 103549 ef0db6 Mailbox 59 API calls 103548->103549 103549->103550 103550->103497 103555 ef0dbe 103551->103555 103553 ef0dd8 103553->103503 103555->103553 103556 ef0ddc std::exception::exception 103555->103556 103609 ef571c 103555->103609 103626 ef33a1 DecodePointer 103555->103626 103627 ef859b RaiseException 103556->103627 103558 ef0e06 103628 ef84d1 58 API calls _free 103558->103628 103560 ef0e18 103560->103503 103562 ef0db6 Mailbox 59 API calls 103561->103562 103563 ed5240 RegQueryValueExW 103562->103563 103563->103507 103563->103509 103565 ed7bd8 __wsetenvp 103564->103565 103566 ed7c45 103564->103566 103568 ed7bee 103565->103568 103569 ed7c13 103565->103569 103567 ed7d2c 59 API calls 103566->103567 103572 ed7bf6 _memmove 103567->103572 103637 ed7f27 59 API calls Mailbox 103568->103637 103571 ed8029 59 API calls 103569->103571 103571->103572 103572->103509 103574 ed7df0 __wsetenvp _memmove 103573->103574 103575 ef0db6 Mailbox 59 API calls 103574->103575 103576 ed7e2e 103575->103576 103576->103512 103578 ed4713 GetModuleFileNameW 103577->103578 103578->103524 103580 f01940 __ftell_nolock 103579->103580 103581 ed475d GetFullPathNameW 103580->103581 103582 ed477c 103581->103582 103583 ed4799 103581->103583 103585 ed7bcc 59 API calls 103582->103585 103584 ed7d8c 59 API calls 103583->103584 103586 ed4788 103584->103586 103585->103586 103589 ed7726 103586->103589 103590 ed7734 103589->103590 103593 ed7d2c 103590->103593 103592 ed4794 103592->103527 103594 ed7d43 _memmove 103593->103594 103595 ed7d3a 103593->103595 103594->103592 103595->103594 103597 ed7e4f 103595->103597 103598 ed7e62 103597->103598 103600 ed7e5f _memmove 103597->103600 103599 ef0db6 Mailbox 59 API calls 103598->103599 103599->103600 103600->103594 103602 ed7c5f __wsetenvp 103601->103602 103603 ed8029 59 API calls 103602->103603 103604 ed7c70 _memmove 103602->103604 103605 f0ed07 _memmove 103603->103605 103604->103539 103607 ef0db6 Mailbox 59 API calls 103606->103607 103608 ed8033 103607->103608 103608->103540 103610 ef5797 103609->103610 103618 ef5728 103609->103618 103635 ef33a1 DecodePointer 103610->103635 103612 ef579d 103636 ef8b28 58 API calls __getptd_noexit 103612->103636 103615 ef575b RtlAllocateHeap 103616 ef578f 103615->103616 103615->103618 103616->103555 103618->103615 103619 ef5783 103618->103619 103620 ef5733 103618->103620 103624 ef5781 103618->103624 103632 ef33a1 DecodePointer 103618->103632 103633 ef8b28 58 API calls __getptd_noexit 103619->103633 103620->103618 103629 efa16b 58 API calls 2 library calls 103620->103629 103630 efa1c8 58 API calls 8 library calls 103620->103630 103631 ef309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 103620->103631 103634 ef8b28 58 API calls __getptd_noexit 103624->103634 103626->103555 103627->103558 103628->103560 103629->103620 103630->103620 103632->103618 103633->103624 103634->103616 103635->103612 103636->103616 103637->103572 103639 ef2c50 _raise 103638->103639 103646 ef3217 103639->103646 103645 ef2c77 _raise 103645->103515 103663 ef9c0b 103646->103663 103648 ef2c59 103649 ef2c88 DecodePointer DecodePointer 103648->103649 103650 ef2c65 103649->103650 103651 ef2cb5 103649->103651 103660 ef2c82 103650->103660 103651->103650 103709 ef87a4 59 API calls __beginthreadex 103651->103709 103653 ef2d18 EncodePointer EncodePointer 103653->103650 103654 ef2cc7 103654->103653 103655 ef2cec 103654->103655 103710 ef8864 61 API calls 2 library calls 103654->103710 103655->103650 103659 ef2d06 EncodePointer 103655->103659 103711 ef8864 61 API calls 2 library calls 103655->103711 103658 ef2d00 103658->103650 103658->103659 103659->103653 103712 ef3220 103660->103712 103664 ef9c2f EnterCriticalSection 103663->103664 103665 ef9c1c 103663->103665 103664->103648 103670 ef9c93 103665->103670 103667 ef9c22 103667->103664 103694 ef30b5 58 API calls 3 library calls 103667->103694 103671 ef9c9f _raise 103670->103671 103672 ef9ca8 103671->103672 103673 ef9cc0 103671->103673 103695 efa16b 58 API calls 2 library calls 103672->103695 103676 ef9ce1 _raise 103673->103676 103698 ef881d 58 API calls 2 library calls 103673->103698 103676->103667 103677 ef9cad 103696 efa1c8 58 API calls 8 library calls 103677->103696 103678 ef9cd5 103680 ef9cdc 103678->103680 103681 ef9ceb 103678->103681 103699 ef8b28 58 API calls __getptd_noexit 103680->103699 103684 ef9c0b __lock 58 API calls 103681->103684 103682 ef9cb4 103697 ef309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 103682->103697 103687 ef9cf2 103684->103687 103688 ef9cff 103687->103688 103689 ef9d17 103687->103689 103700 ef9e2b InitializeCriticalSectionAndSpinCount 103688->103700 103701 ef2d55 103689->103701 103692 ef9d0b 103707 ef9d33 LeaveCriticalSection _doexit 103692->103707 103695->103677 103696->103682 103698->103678 103699->103676 103700->103692 103702 ef2d5e RtlFreeHeap 103701->103702 103706 ef2d87 _free 103701->103706 103703 ef2d73 103702->103703 103702->103706 103708 ef8b28 58 API calls __getptd_noexit 103703->103708 103705 ef2d79 GetLastError 103705->103706 103706->103692 103707->103676 103708->103705 103709->103654 103710->103655 103711->103658 103715 ef9d75 LeaveCriticalSection 103712->103715 103714 ef2c87 103714->103645 103715->103714 103716 edb40e 103724 eef944 103716->103724 103718 edb424 103733 edc5a7 103718->103733 103720 edb44c 103721 eda388 103720->103721 103745 f39e4a 89 API calls 4 library calls 103720->103745 103723 f108e9 103725 eef962 103724->103725 103726 eef950 103724->103726 103728 eef968 103725->103728 103729 eef991 103725->103729 103746 ed9d3c 60 API calls Mailbox 103726->103746 103731 ef0db6 Mailbox 59 API calls 103728->103731 103747 ed9d3c 60 API calls Mailbox 103729->103747 103732 eef95a 103731->103732 103732->103718 103748 ed7a16 103733->103748 103735 edc5cc _wcscmp 103736 ed7de1 59 API calls 103735->103736 103738 edc600 Mailbox 103735->103738 103737 f11691 103736->103737 103753 ed7b2e 103737->103753 103738->103720 103742 f116ad 103744 f116b1 Mailbox 103742->103744 103763 ed9d3c 60 API calls Mailbox 103742->103763 103744->103720 103745->103723 103746->103732 103747->103732 103749 ef0db6 Mailbox 59 API calls 103748->103749 103750 ed7a3b 103749->103750 103751 ed8029 59 API calls 103750->103751 103752 ed7a4a 103751->103752 103752->103735 103754 f0ec6b 103753->103754 103755 ed7b40 103753->103755 103770 f27bdb 59 API calls _memmove 103754->103770 103764 ed7a51 103755->103764 103758 ed7b4c 103762 ed843a 68 API calls 103758->103762 103759 f0ec75 103771 ed8047 103759->103771 103761 f0ec7d Mailbox 103762->103742 103763->103744 103765 ed7a5f 103764->103765 103769 ed7a85 _memmove 103764->103769 103766 ef0db6 Mailbox 59 API calls 103765->103766 103765->103769 103767 ed7ad4 103766->103767 103768 ef0db6 Mailbox 59 API calls 103767->103768 103768->103769 103769->103758 103770->103759 103772 ed805a 103771->103772 103773 ed8052 103771->103773 103772->103761 103775 ed7f77 59 API calls 2 library calls 103773->103775 103775->103772 103776 17ebc7b 103777 17ebc82 103776->103777 103778 17ebc8a 103777->103778 103779 17ebd20 103777->103779 103783 17eb930 103778->103783 103796 17ec5d0 9 API calls 103779->103796 103782 17ebd07 103797 17e9320 103783->103797 103786 17eba00 CreateFileW 103787 17eb9cf 103786->103787 103793 17eba0d 103786->103793 103788 17eba29 VirtualAlloc 103787->103788 103787->103793 103794 17ebb30 CloseHandle 103787->103794 103795 17ebb40 VirtualFree 103787->103795 103800 17ec840 GetPEB 103787->103800 103789 17eba4a ReadFile 103788->103789 103788->103793 103792 17eba68 VirtualAlloc 103789->103792 103789->103793 103790 17ebc1c VirtualFree 103791 17ebc2a 103790->103791 103791->103782 103792->103787 103792->103793 103793->103790 103793->103791 103794->103787 103795->103787 103796->103782 103799 17e99ab 103797->103799 103802 17ec7e0 GetPEB 103797->103802 103799->103787 103801 17ec86a 103800->103801 103801->103786 103802->103799 103803 ede5ab 103806 edd100 103803->103806 103805 ede5b9 103807 edd11d 103806->103807 103835 edd37d 103806->103835 103808 f12691 103807->103808 103809 f126e0 103807->103809 103832 edd144 103807->103832 103812 f12694 103808->103812 103820 f126af 103808->103820 103878 f4a3e6 341 API calls __cinit 103809->103878 103813 f126a0 103812->103813 103812->103832 103876 f4a9fa 341 API calls 103813->103876 103815 ef2d40 __cinit 67 API calls 103815->103832 103817 f128b5 103817->103817 103818 edd54b 103818->103805 103819 edd434 103870 ed8a52 68 API calls 103819->103870 103820->103835 103877 f4aea2 341 API calls 3 library calls 103820->103877 103824 edd443 103824->103805 103825 f127fc 103882 f4a751 89 API calls 103825->103882 103832->103815 103832->103818 103832->103819 103832->103825 103832->103835 103838 ed8047 59 API calls 103832->103838 103840 ed9ea0 103832->103840 103864 ed8740 68 API calls __cinit 103832->103864 103865 ed8542 68 API calls 103832->103865 103866 ed84c0 103832->103866 103871 ed843a 68 API calls 103832->103871 103872 edcf7c 341 API calls 103832->103872 103873 ed9dda 59 API calls Mailbox 103832->103873 103874 edcf00 89 API calls 103832->103874 103875 edcd7d 341 API calls 103832->103875 103879 ed8a52 68 API calls 103832->103879 103880 ed9d3c 60 API calls Mailbox 103832->103880 103881 f2678d 60 API calls 103832->103881 103835->103818 103883 f39e4a 89 API calls 4 library calls 103835->103883 103838->103832 103841 ed9ebf 103840->103841 103861 ed9eed Mailbox 103840->103861 103842 ef0db6 Mailbox 59 API calls 103841->103842 103842->103861 103843 ef2d40 67 API calls __cinit 103843->103861 103844 edb47a 103848 f109e5 103844->103848 103849 f10055 103844->103849 103845 edb475 103846 ed8047 59 API calls 103845->103846 103847 eda057 103846->103847 103847->103832 103889 f39e4a 89 API calls 4 library calls 103848->103889 103886 f39e4a 89 API calls 4 library calls 103849->103886 103850 ed7667 59 API calls 103850->103861 103851 ef0db6 59 API calls Mailbox 103851->103861 103855 f10064 103855->103832 103857 ed8047 59 API calls 103857->103861 103859 f26e8f 59 API calls 103859->103861 103860 f109d6 103888 f39e4a 89 API calls 4 library calls 103860->103888 103861->103843 103861->103844 103861->103845 103861->103847 103861->103849 103861->103850 103861->103851 103861->103857 103861->103859 103861->103860 103863 eda55a 103861->103863 103884 edc8c0 341 API calls 2 library calls 103861->103884 103885 edb900 60 API calls Mailbox 103861->103885 103887 f39e4a 89 API calls 4 library calls 103863->103887 103864->103832 103865->103832 103867 ed84cb 103866->103867 103868 ed84f2 103867->103868 103890 ed89b3 69 API calls Mailbox 103867->103890 103868->103832 103870->103824 103871->103832 103872->103832 103873->103832 103874->103832 103875->103832 103876->103818 103877->103835 103878->103832 103879->103832 103880->103832 103881->103832 103882->103835 103883->103817 103884->103861 103885->103861 103886->103855 103887->103847 103888->103848 103889->103847 103890->103868 103891 ed552a 103898 ed5ab8 103891->103898 103896 ed555a Mailbox 103899 ef0db6 Mailbox 59 API calls 103898->103899 103900 ed5acb 103899->103900 103901 ef0db6 Mailbox 59 API calls 103900->103901 103902 ed553c 103901->103902 103903 ed54d2 103902->103903 103917 ed58cf 103903->103917 103905 ed5514 103905->103896 103909 ed8061 MultiByteToWideChar 103905->103909 103907 ed54e3 103907->103905 103924 ed5bc0 103907->103924 103930 ed5a7a 103907->103930 103910 ed80ce 103909->103910 103911 ed8087 103909->103911 103913 ed7d8c 59 API calls 103910->103913 103912 ef0db6 Mailbox 59 API calls 103911->103912 103914 ed809c MultiByteToWideChar 103912->103914 103916 ed80c0 103913->103916 103947 ed774d 59 API calls 2 library calls 103914->103947 103916->103896 103918 f0dc3c 103917->103918 103919 ed58e0 103917->103919 103939 f25ecd 59 API calls Mailbox 103918->103939 103919->103907 103921 f0dc46 103922 ef0db6 Mailbox 59 API calls 103921->103922 103923 f0dc52 103922->103923 103925 ed5c33 103924->103925 103929 ed5bce 103924->103929 103940 ed5c4e SetFilePointerEx 103925->103940 103926 ed5bf6 103926->103907 103928 ed5c06 ReadFile 103928->103926 103928->103929 103929->103926 103929->103928 103931 ed5a8e 103930->103931 103932 f0dcee 103930->103932 103941 ed59b9 103931->103941 103946 f25ecd 59 API calls Mailbox 103932->103946 103935 ed5a9a 103935->103907 103936 f0dcf9 103937 ef0db6 Mailbox 59 API calls 103936->103937 103938 f0dd0e _memmove 103937->103938 103939->103921 103940->103929 103942 ed59d1 103941->103942 103945 ed59ca _memmove 103941->103945 103943 ef0db6 Mailbox 59 API calls 103942->103943 103944 f0dc7e 103942->103944 103943->103945 103945->103935 103946->103936 103947->103916 103948 ed1055 103953 ed2649 103948->103953 103951 ef2d40 __cinit 67 API calls 103952 ed1064 103951->103952 103954 ed7667 59 API calls 103953->103954 103955 ed26b7 103954->103955 103960 ed3582 103955->103960 103958 ed2754 103959 ed105a 103958->103959 103963 ed3416 59 API calls 2 library calls 103958->103963 103959->103951 103964 ed35b0 103960->103964 103963->103958 103965 ed35bd 103964->103965 103966 ed35a1 103964->103966 103965->103966 103967 ed35c4 RegOpenKeyExW 103965->103967 103966->103958 103967->103966 103968 ed35de RegQueryValueExW 103967->103968 103969 ed3614 RegCloseKey 103968->103969 103970 ed35ff 103968->103970 103969->103966 103970->103969 103971 ef7c56 103972 ef7c62 _raise 103971->103972 104008 ef9e08 GetStartupInfoW 103972->104008 103974 ef7c67 104010 ef8b7c GetProcessHeap 103974->104010 103976 ef7cbf 103977 ef7cca 103976->103977 104093 ef7da6 58 API calls 3 library calls 103976->104093 104011 ef9ae6 103977->104011 103980 ef7cd0 103981 ef7cdb __RTC_Initialize 103980->103981 104094 ef7da6 58 API calls 3 library calls 103980->104094 104032 efd5d2 103981->104032 103984 ef7cea 103985 ef7cf6 GetCommandLineW 103984->103985 104095 ef7da6 58 API calls 3 library calls 103984->104095 104051 f04f23 GetEnvironmentStringsW 103985->104051 103988 ef7cf5 103988->103985 103991 ef7d10 103992 ef7d1b 103991->103992 104096 ef30b5 58 API calls 3 library calls 103991->104096 104061 f04d58 103992->104061 103995 ef7d21 103996 ef7d2c 103995->103996 104097 ef30b5 58 API calls 3 library calls 103995->104097 104075 ef30ef 103996->104075 103999 ef7d34 104000 ef7d3f __wwincmdln 103999->104000 104098 ef30b5 58 API calls 3 library calls 103999->104098 104081 ed47d0 104000->104081 104003 ef7d53 104004 ef7d62 104003->104004 104099 ef3358 58 API calls _doexit 104003->104099 104100 ef30e0 58 API calls _doexit 104004->104100 104007 ef7d67 _raise 104009 ef9e1e 104008->104009 104009->103974 104010->103976 104101 ef3187 36 API calls 2 library calls 104011->104101 104013 ef9aeb 104102 ef9d3c InitializeCriticalSectionAndSpinCount ___lock_fhandle 104013->104102 104015 ef9af0 104016 ef9af4 104015->104016 104104 ef9d8a TlsAlloc 104015->104104 104103 ef9b5c 61 API calls 2 library calls 104016->104103 104019 ef9af9 104019->103980 104020 ef9b06 104020->104016 104021 ef9b11 104020->104021 104105 ef87d5 104021->104105 104024 ef9b53 104113 ef9b5c 61 API calls 2 library calls 104024->104113 104027 ef9b32 104027->104024 104029 ef9b38 104027->104029 104028 ef9b58 104028->103980 104112 ef9a33 58 API calls 4 library calls 104029->104112 104031 ef9b40 GetCurrentThreadId 104031->103980 104033 efd5de _raise 104032->104033 104034 ef9c0b __lock 58 API calls 104033->104034 104035 efd5e5 104034->104035 104036 ef87d5 __calloc_crt 58 API calls 104035->104036 104038 efd5f6 104036->104038 104037 efd661 GetStartupInfoW 104045 efd676 104037->104045 104048 efd7a5 104037->104048 104038->104037 104039 efd601 _raise @_EH4_CallFilterFunc@8 104038->104039 104039->103984 104040 efd86d 104127 efd87d LeaveCriticalSection _doexit 104040->104127 104042 ef87d5 __calloc_crt 58 API calls 104042->104045 104043 efd7f2 GetStdHandle 104043->104048 104044 efd805 GetFileType 104044->104048 104045->104042 104047 efd6c4 104045->104047 104045->104048 104046 efd6f8 GetFileType 104046->104047 104047->104046 104047->104048 104125 ef9e2b InitializeCriticalSectionAndSpinCount 104047->104125 104048->104040 104048->104043 104048->104044 104126 ef9e2b InitializeCriticalSectionAndSpinCount 104048->104126 104052 f04f34 104051->104052 104053 ef7d06 104051->104053 104128 ef881d 58 API calls 2 library calls 104052->104128 104057 f04b1b GetModuleFileNameW 104053->104057 104055 f04f70 FreeEnvironmentStringsW 104055->104053 104056 f04f5a _memmove 104056->104055 104058 f04b4f _wparse_cmdline 104057->104058 104060 f04b8f _wparse_cmdline 104058->104060 104129 ef881d 58 API calls 2 library calls 104058->104129 104060->103991 104062 f04d71 __wsetenvp 104061->104062 104066 f04d69 104061->104066 104063 ef87d5 __calloc_crt 58 API calls 104062->104063 104071 f04d9a __wsetenvp 104063->104071 104064 f04df1 104065 ef2d55 _free 58 API calls 104064->104065 104065->104066 104066->103995 104067 ef87d5 __calloc_crt 58 API calls 104067->104071 104068 f04e16 104069 ef2d55 _free 58 API calls 104068->104069 104069->104066 104071->104064 104071->104066 104071->104067 104071->104068 104072 f04e2d 104071->104072 104130 f04607 58 API calls __beginthreadex 104071->104130 104131 ef8dc6 IsProcessorFeaturePresent 104072->104131 104074 f04e39 104074->103995 104077 ef30fb __IsNonwritableInCurrentImage 104075->104077 104154 efa4d1 104077->104154 104078 ef3119 __initterm_e 104079 ef2d40 __cinit 67 API calls 104078->104079 104080 ef3138 _doexit __IsNonwritableInCurrentImage 104078->104080 104079->104080 104080->103999 104082 ed47ea 104081->104082 104092 ed4889 104081->104092 104083 ed4824 IsThemeActive 104082->104083 104157 ef336c 104083->104157 104087 ed4850 104169 ed48fd SystemParametersInfoW SystemParametersInfoW 104087->104169 104089 ed485c 104170 ed3b3a 104089->104170 104091 ed4864 SystemParametersInfoW 104091->104092 104092->104003 104093->103977 104094->103981 104095->103988 104099->104004 104100->104007 104101->104013 104102->104015 104103->104019 104104->104020 104108 ef87dc 104105->104108 104107 ef8817 104107->104024 104111 ef9de6 TlsSetValue 104107->104111 104108->104107 104110 ef87fa 104108->104110 104114 f051f6 104108->104114 104110->104107 104110->104108 104122 efa132 Sleep 104110->104122 104111->104027 104112->104031 104113->104028 104115 f05201 104114->104115 104117 f0521c 104114->104117 104116 f0520d 104115->104116 104115->104117 104123 ef8b28 58 API calls __getptd_noexit 104116->104123 104118 f0522c HeapAlloc 104117->104118 104120 f05212 104117->104120 104124 ef33a1 DecodePointer 104117->104124 104118->104117 104118->104120 104120->104108 104122->104110 104123->104120 104124->104117 104125->104047 104126->104048 104127->104039 104128->104056 104129->104060 104130->104071 104132 ef8dd1 104131->104132 104137 ef8c59 104132->104137 104136 ef8dec 104136->104074 104138 ef8c73 _memset __call_reportfault 104137->104138 104139 ef8c93 IsDebuggerPresent 104138->104139 104145 efa155 SetUnhandledExceptionFilter UnhandledExceptionFilter 104139->104145 104141 ef8d57 __call_reportfault 104146 efc5f6 104141->104146 104143 ef8d7a 104144 efa140 GetCurrentProcess TerminateProcess 104143->104144 104144->104136 104145->104141 104147 efc5fe 104146->104147 104148 efc600 IsProcessorFeaturePresent 104146->104148 104147->104143 104150 f0590a 104148->104150 104153 f058b9 5 API calls 2 library calls 104150->104153 104152 f059ed 104152->104143 104153->104152 104155 efa4d4 EncodePointer 104154->104155 104155->104155 104156 efa4ee 104155->104156 104156->104078 104158 ef9c0b __lock 58 API calls 104157->104158 104159 ef3377 DecodePointer EncodePointer 104158->104159 104222 ef9d75 LeaveCriticalSection 104159->104222 104161 ed4849 104162 ef33d4 104161->104162 104163 ef33de 104162->104163 104164 ef33f8 104162->104164 104163->104164 104223 ef8b28 58 API calls __getptd_noexit 104163->104223 104164->104087 104166 ef33e8 104224 ef8db6 9 API calls __beginthreadex 104166->104224 104168 ef33f3 104168->104087 104169->104089 104171 ed3b47 __ftell_nolock 104170->104171 104172 ed7667 59 API calls 104171->104172 104173 ed3b51 GetCurrentDirectoryW 104172->104173 104225 ed3766 104173->104225 104175 ed3b7a IsDebuggerPresent 104176 f0d272 MessageBoxA 104175->104176 104177 ed3b88 104175->104177 104180 f0d28c 104176->104180 104178 ed3c61 104177->104178 104177->104180 104181 ed3ba5 104177->104181 104179 ed3c68 SetCurrentDirectoryW 104178->104179 104182 ed3c75 Mailbox 104179->104182 104435 ed7213 59 API calls Mailbox 104180->104435 104306 ed7285 104181->104306 104182->104091 104185 f0d29c 104190 f0d2b2 SetCurrentDirectoryW 104185->104190 104187 ed3bc3 GetFullPathNameW 104188 ed7bcc 59 API calls 104187->104188 104189 ed3bfe 104188->104189 104322 ee092d 104189->104322 104190->104182 104222->104161 104223->104166 104224->104168 104226 ed7667 59 API calls 104225->104226 104227 ed377c 104226->104227 104437 ed3d31 104227->104437 104229 ed379a 104230 ed4706 61 API calls 104229->104230 104231 ed37ae 104230->104231 104232 ed7de1 59 API calls 104231->104232 104233 ed37bb 104232->104233 104451 ed4ddd 104233->104451 104236 ed37dc Mailbox 104241 ed8047 59 API calls 104236->104241 104237 f0d173 104514 f3955b 104237->104514 104240 f0d192 104244 ef2d55 _free 58 API calls 104240->104244 104242 ed37ef 104241->104242 104475 ed928a 104242->104475 104245 f0d19f 104244->104245 104247 ed4e4a 84 API calls 104245->104247 104249 f0d1a8 104247->104249 104253 ed3ed0 59 API calls 104249->104253 104250 ed7de1 59 API calls 104251 ed3808 104250->104251 104252 ed84c0 69 API calls 104251->104252 104254 ed381a Mailbox 104252->104254 104255 f0d1c3 104253->104255 104256 ed7de1 59 API calls 104254->104256 104257 ed3ed0 59 API calls 104255->104257 104258 ed3840 104256->104258 104259 f0d1df 104257->104259 104260 ed84c0 69 API calls 104258->104260 104261 ed4706 61 API calls 104259->104261 104263 ed384f Mailbox 104260->104263 104262 f0d204 104261->104262 104264 ed3ed0 59 API calls 104262->104264 104266 ed7667 59 API calls 104263->104266 104265 f0d210 104264->104265 104267 ed8047 59 API calls 104265->104267 104268 ed386d 104266->104268 104269 f0d21e 104267->104269 104478 ed3ed0 104268->104478 104271 ed3ed0 59 API calls 104269->104271 104273 f0d22d 104271->104273 104279 ed8047 59 API calls 104273->104279 104275 ed3887 104275->104249 104276 ed3891 104275->104276 104277 ef2efd _W_store_winword 60 API calls 104276->104277 104278 ed389c 104277->104278 104278->104255 104280 ed38a6 104278->104280 104281 f0d24f 104279->104281 104282 ef2efd _W_store_winword 60 API calls 104280->104282 104283 ed3ed0 59 API calls 104281->104283 104284 ed38b1 104282->104284 104285 f0d25c 104283->104285 104284->104259 104286 ed38bb 104284->104286 104285->104285 104287 ef2efd _W_store_winword 60 API calls 104286->104287 104288 ed38c6 104287->104288 104288->104273 104289 ed3907 104288->104289 104291 ed3ed0 59 API calls 104288->104291 104289->104273 104290 ed3914 104289->104290 104494 ed92ce 104290->104494 104292 ed38ea 104291->104292 104294 ed8047 59 API calls 104292->104294 104296 ed38f8 104294->104296 104298 ed3ed0 59 API calls 104296->104298 104298->104289 104301 ed928a 59 API calls 104303 ed394f 104301->104303 104302 ed8ee0 60 API calls 104302->104303 104303->104301 104303->104302 104304 ed3995 Mailbox 104303->104304 104305 ed3ed0 59 API calls 104303->104305 104304->104175 104305->104303 104307 ed7292 __ftell_nolock 104306->104307 104308 f0ea22 _memset 104307->104308 104309 ed72ab 104307->104309 104312 f0ea3e GetOpenFileNameW 104308->104312 104310 ed4750 60 API calls 104309->104310 104311 ed72b4 104310->104311 105374 ef0791 104311->105374 104314 f0ea8d 104312->104314 104316 ed7bcc 59 API calls 104314->104316 104318 f0eaa2 104316->104318 104318->104318 104319 ed72c9 105392 ed686a 104319->105392 104323 ee093a __ftell_nolock 104322->104323 105697 ed6d80 104323->105697 104435->104185 104439 ed3d3e __ftell_nolock 104437->104439 104438 ed3ea4 Mailbox 104438->104229 104439->104438 104440 ed7bcc 59 API calls 104439->104440 104441 ed3d70 104440->104441 104450 ed3da6 Mailbox 104441->104450 104555 ed79f2 104441->104555 104443 ed79f2 59 API calls 104443->104450 104444 ed3e77 104444->104438 104445 ed7de1 59 API calls 104444->104445 104446 ed3e98 104445->104446 104448 ed3f74 59 API calls 104446->104448 104447 ed7de1 59 API calls 104447->104450 104448->104438 104449 ed3f74 59 API calls 104449->104450 104450->104438 104450->104443 104450->104444 104450->104447 104450->104449 104558 ed4bb5 104451->104558 104456 ed4e08 LoadLibraryExW 104568 ed4b6a 104456->104568 104457 f0d8e6 104459 ed4e4a 84 API calls 104457->104459 104461 f0d8ed 104459->104461 104463 ed4b6a 3 API calls 104461->104463 104465 f0d8f5 104463->104465 104464 ed4e2f 104464->104465 104466 ed4e3b 104464->104466 104594 ed4f0b 104465->104594 104468 ed4e4a 84 API calls 104466->104468 104470 ed37d4 104468->104470 104470->104236 104470->104237 104472 f0d91c 104602 ed4ec7 104472->104602 104474 f0d929 104476 ef0db6 Mailbox 59 API calls 104475->104476 104477 ed37fb 104476->104477 104477->104250 104479 ed3eda 104478->104479 104480 ed3ef3 104478->104480 104481 ed8047 59 API calls 104479->104481 104482 ed7bcc 59 API calls 104480->104482 104483 ed3879 104481->104483 104482->104483 104484 ef2efd 104483->104484 104485 ef2f7e 104484->104485 104486 ef2f09 104484->104486 105031 ef2f90 60 API calls 3 library calls 104485->105031 104493 ef2f2e 104486->104493 105029 ef8b28 58 API calls __getptd_noexit 104486->105029 104488 ef2f8b 104488->104275 104490 ef2f15 105030 ef8db6 9 API calls __beginthreadex 104490->105030 104492 ef2f20 104492->104275 104493->104275 104495 ed92d6 104494->104495 104496 ef0db6 Mailbox 59 API calls 104495->104496 104497 ed92e4 104496->104497 104498 ed3924 104497->104498 105032 ed91fc 59 API calls Mailbox 104497->105032 104500 ed9050 104498->104500 105033 ed9160 104500->105033 104502 ef0db6 Mailbox 59 API calls 104504 ed3932 104502->104504 104503 ed905f 104503->104502 104503->104504 104505 ed8ee0 104504->104505 104506 f0f17c 104505->104506 104508 ed8ef7 104505->104508 104506->104508 105048 ed8bdb 59 API calls Mailbox 104506->105048 104509 ed8ff8 104508->104509 104510 ed9040 104508->104510 104513 ed8fff 104508->104513 104512 ef0db6 Mailbox 59 API calls 104509->104512 105047 ed9d3c 60 API calls Mailbox 104510->105047 104512->104513 104513->104303 104515 ed4ee5 85 API calls 104514->104515 104516 f395ca 104515->104516 105049 f39734 104516->105049 104519 ed4f0b 74 API calls 104520 f395f7 104519->104520 104521 ed4f0b 74 API calls 104520->104521 104522 f39607 104521->104522 104523 ed4f0b 74 API calls 104522->104523 104524 f39622 104523->104524 104525 ed4f0b 74 API calls 104524->104525 104526 f3963d 104525->104526 104527 ed4ee5 85 API calls 104526->104527 104528 f39654 104527->104528 104529 ef571c std::exception::_Copy_str 58 API calls 104528->104529 104530 f3965b 104529->104530 104531 ef571c std::exception::_Copy_str 58 API calls 104530->104531 104532 f39665 104531->104532 104533 ed4f0b 74 API calls 104532->104533 104534 f39679 104533->104534 104535 f39109 GetSystemTimeAsFileTime 104534->104535 104536 f3968c 104535->104536 104537 f396a1 104536->104537 104538 f396b6 104536->104538 104541 ef2d55 _free 58 API calls 104537->104541 104539 f3971b 104538->104539 104540 f396bc 104538->104540 104543 ef2d55 _free 58 API calls 104539->104543 105055 f38b06 104540->105055 104544 f396a7 104541->104544 104546 f0d186 104543->104546 104547 ef2d55 _free 58 API calls 104544->104547 104546->104240 104549 ed4e4a 104546->104549 104547->104546 104548 ef2d55 _free 58 API calls 104548->104546 104550 ed4e54 104549->104550 104552 ed4e5b 104549->104552 104551 ef53a6 __fcloseall 83 API calls 104550->104551 104551->104552 104553 ed4e7b FreeLibrary 104552->104553 104554 ed4e6a 104552->104554 104553->104554 104554->104240 104556 ed7e4f 59 API calls 104555->104556 104557 ed79fd 104556->104557 104557->104441 104607 ed4c03 104558->104607 104561 ed4bec FreeLibrary 104562 ed4bf5 104561->104562 104565 ef525b 104562->104565 104563 ed4c03 2 API calls 104564 ed4bdc 104563->104564 104564->104561 104564->104562 104611 ef5270 104565->104611 104567 ed4dfc 104567->104456 104567->104457 104769 ed4c36 104568->104769 104571 ed4b8f 104573 ed4baa 104571->104573 104574 ed4ba1 FreeLibrary 104571->104574 104572 ed4c36 2 API calls 104572->104571 104575 ed4c70 104573->104575 104574->104573 104576 ef0db6 Mailbox 59 API calls 104575->104576 104577 ed4c85 104576->104577 104578 ed522e 59 API calls 104577->104578 104579 ed4c91 _memmove 104578->104579 104580 ed4ccc 104579->104580 104581 ed4d89 104579->104581 104582 ed4dc1 104579->104582 104583 ed4ec7 69 API calls 104580->104583 104773 ed4e89 CreateStreamOnHGlobal 104581->104773 104784 f3991b 95 API calls 104582->104784 104586 ed4cd5 104583->104586 104587 ed4f0b 74 API calls 104586->104587 104588 ed4d69 104586->104588 104590 f0d8a7 104586->104590 104779 ed4ee5 104586->104779 104587->104586 104588->104464 104591 ed4ee5 85 API calls 104590->104591 104592 f0d8bb 104591->104592 104593 ed4f0b 74 API calls 104592->104593 104593->104588 104595 ed4f1d 104594->104595 104596 f0d9cd 104594->104596 104808 ef55e2 104595->104808 104599 f39109 105006 f38f5f 104599->105006 104601 f3911f 104601->104472 104603 f0d990 104602->104603 104604 ed4ed6 104602->104604 105011 ef5c60 104604->105011 104606 ed4ede 104606->104474 104608 ed4bd0 104607->104608 104609 ed4c0c LoadLibraryA 104607->104609 104608->104563 104608->104564 104609->104608 104610 ed4c1d GetProcAddress 104609->104610 104610->104608 104614 ef527c _raise 104611->104614 104612 ef528f 104660 ef8b28 58 API calls __getptd_noexit 104612->104660 104614->104612 104616 ef52c0 104614->104616 104615 ef5294 104661 ef8db6 9 API calls __beginthreadex 104615->104661 104630 f004e8 104616->104630 104619 ef52c5 104620 ef52ce 104619->104620 104621 ef52db 104619->104621 104662 ef8b28 58 API calls __getptd_noexit 104620->104662 104623 ef5305 104621->104623 104624 ef52e5 104621->104624 104645 f00607 104623->104645 104663 ef8b28 58 API calls __getptd_noexit 104624->104663 104627 ef529f _raise @_EH4_CallFilterFunc@8 104627->104567 104631 f004f4 _raise 104630->104631 104632 ef9c0b __lock 58 API calls 104631->104632 104643 f00502 104632->104643 104633 f00576 104665 f005fe 104633->104665 104634 f0057d 104670 ef881d 58 API calls 2 library calls 104634->104670 104637 f00584 104637->104633 104671 ef9e2b InitializeCriticalSectionAndSpinCount 104637->104671 104638 f005f3 _raise 104638->104619 104640 ef9c93 __mtinitlocknum 58 API calls 104640->104643 104642 f005aa EnterCriticalSection 104642->104633 104643->104633 104643->104634 104643->104640 104668 ef6c50 59 API calls __lock 104643->104668 104669 ef6cba LeaveCriticalSection LeaveCriticalSection _doexit 104643->104669 104653 f00627 __wopenfile 104645->104653 104646 f00641 104676 ef8b28 58 API calls __getptd_noexit 104646->104676 104648 f00646 104677 ef8db6 9 API calls __beginthreadex 104648->104677 104650 ef5310 104664 ef5332 LeaveCriticalSection LeaveCriticalSection _fprintf 104650->104664 104651 f0085f 104673 f085a1 104651->104673 104653->104646 104659 f007fc 104653->104659 104678 ef37cb 60 API calls 2 library calls 104653->104678 104655 f007f5 104655->104659 104679 ef37cb 60 API calls 2 library calls 104655->104679 104657 f00814 104657->104659 104680 ef37cb 60 API calls 2 library calls 104657->104680 104659->104646 104659->104651 104660->104615 104661->104627 104662->104627 104663->104627 104664->104627 104672 ef9d75 LeaveCriticalSection 104665->104672 104667 f00605 104667->104638 104668->104643 104669->104643 104670->104637 104671->104642 104672->104667 104681 f07d85 104673->104681 104675 f085ba 104675->104650 104676->104648 104677->104650 104678->104655 104679->104657 104680->104659 104684 f07d91 _raise 104681->104684 104682 f07da7 104766 ef8b28 58 API calls __getptd_noexit 104682->104766 104684->104682 104686 f07ddd 104684->104686 104685 f07dac 104767 ef8db6 9 API calls __beginthreadex 104685->104767 104692 f07e4e 104686->104692 104689 f07df9 104768 f07e22 LeaveCriticalSection __unlock_fhandle 104689->104768 104691 f07db6 _raise 104691->104675 104693 f07e6e 104692->104693 104694 ef44ea __wsopen_nolock 58 API calls 104693->104694 104698 f07e8a 104694->104698 104695 f07fc1 104696 ef8dc6 __invoke_watson 8 API calls 104695->104696 104697 f085a0 104696->104697 104700 f07d85 __wsopen_helper 103 API calls 104697->104700 104698->104695 104699 f07ec4 104698->104699 104706 f07ee7 104698->104706 104701 ef8af4 __close 58 API calls 104699->104701 104702 f085ba 104700->104702 104703 f07ec9 104701->104703 104702->104689 104704 ef8b28 __beginthreadex 58 API calls 104703->104704 104705 f07ed6 104704->104705 104708 ef8db6 __beginthreadex 9 API calls 104705->104708 104707 f07fa5 104706->104707 104715 f07f83 104706->104715 104709 ef8af4 __close 58 API calls 104707->104709 104710 f07ee0 104708->104710 104711 f07faa 104709->104711 104710->104689 104712 ef8b28 __beginthreadex 58 API calls 104711->104712 104713 f07fb7 104712->104713 104714 ef8db6 __beginthreadex 9 API calls 104713->104714 104714->104695 104716 efd294 __alloc_osfhnd 61 API calls 104715->104716 104717 f08051 104716->104717 104718 f0805b 104717->104718 104719 f0807e 104717->104719 104721 ef8af4 __close 58 API calls 104718->104721 104720 f07cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 104719->104720 104730 f080a0 104720->104730 104722 f08060 104721->104722 104724 ef8b28 __beginthreadex 58 API calls 104722->104724 104723 f0811e GetFileType 104727 f08129 GetLastError 104723->104727 104728 f0816b 104723->104728 104726 f0806a 104724->104726 104725 f080ec GetLastError 104731 ef8b07 __dosmaperr 58 API calls 104725->104731 104732 ef8b28 __beginthreadex 58 API calls 104726->104732 104729 ef8b07 __dosmaperr 58 API calls 104727->104729 104738 efd52a __set_osfhnd 59 API calls 104728->104738 104733 f08150 CloseHandle 104729->104733 104730->104723 104730->104725 104734 f07cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 104730->104734 104735 f08111 104731->104735 104732->104710 104733->104735 104736 f0815e 104733->104736 104737 f080e1 104734->104737 104740 ef8b28 __beginthreadex 58 API calls 104735->104740 104739 ef8b28 __beginthreadex 58 API calls 104736->104739 104737->104723 104737->104725 104743 f08189 104738->104743 104741 f08163 104739->104741 104740->104695 104741->104735 104742 f08344 104742->104695 104746 f08517 CloseHandle 104742->104746 104743->104742 104744 f018c1 __lseeki64_nolock 60 API calls 104743->104744 104761 f0820a 104743->104761 104745 f081f3 104744->104745 104749 ef8af4 __close 58 API calls 104745->104749 104745->104761 104747 f07cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 104746->104747 104748 f0853e 104747->104748 104751 f08546 GetLastError 104748->104751 104752 f08572 104748->104752 104749->104761 104750 f00e5b 70 API calls __read_nolock 104750->104761 104753 ef8b07 __dosmaperr 58 API calls 104751->104753 104752->104695 104754 f08552 104753->104754 104757 efd43d __free_osfhnd 59 API calls 104754->104757 104755 f00add __close_nolock 61 API calls 104755->104761 104756 f0823c 104758 f097a2 __chsize_nolock 82 API calls 104756->104758 104756->104761 104757->104752 104758->104756 104759 f018c1 60 API calls __lseeki64_nolock 104759->104761 104760 efd886 __write 78 API calls 104760->104761 104761->104742 104761->104750 104761->104755 104761->104756 104761->104759 104761->104760 104762 f083c1 104761->104762 104763 f00add __close_nolock 61 API calls 104762->104763 104764 f083c8 104763->104764 104765 ef8b28 __beginthreadex 58 API calls 104764->104765 104765->104695 104766->104685 104767->104691 104768->104691 104770 ed4b83 104769->104770 104771 ed4c3f LoadLibraryA 104769->104771 104770->104571 104770->104572 104771->104770 104772 ed4c50 GetProcAddress 104771->104772 104772->104770 104774 ed4ea3 FindResourceExW 104773->104774 104776 ed4ec0 104773->104776 104775 f0d933 LoadResource 104774->104775 104774->104776 104775->104776 104777 f0d948 SizeofResource 104775->104777 104776->104580 104777->104776 104778 f0d95c LockResource 104777->104778 104778->104776 104780 ed4ef4 104779->104780 104781 f0d9ab 104779->104781 104785 ef584d 104780->104785 104783 ed4f02 104783->104586 104784->104580 104786 ef5859 _raise 104785->104786 104787 ef586b 104786->104787 104788 ef5891 104786->104788 104798 ef8b28 58 API calls __getptd_noexit 104787->104798 104800 ef6c11 104788->104800 104791 ef5870 104799 ef8db6 9 API calls __beginthreadex 104791->104799 104793 ef5897 104806 ef57be 83 API calls 5 library calls 104793->104806 104795 ef58a6 104807 ef58c8 LeaveCriticalSection LeaveCriticalSection _fprintf 104795->104807 104797 ef587b _raise 104797->104783 104798->104791 104799->104797 104801 ef6c43 EnterCriticalSection 104800->104801 104802 ef6c21 104800->104802 104804 ef6c39 104801->104804 104802->104801 104803 ef6c29 104802->104803 104805 ef9c0b __lock 58 API calls 104803->104805 104804->104793 104805->104804 104806->104795 104807->104797 104811 ef55fd 104808->104811 104810 ed4f2e 104810->104599 104812 ef5609 _raise 104811->104812 104813 ef561f _memset 104812->104813 104814 ef564c 104812->104814 104816 ef5644 _raise 104812->104816 104838 ef8b28 58 API calls __getptd_noexit 104813->104838 104815 ef6c11 __lock_file 59 API calls 104814->104815 104817 ef5652 104815->104817 104816->104810 104824 ef541d 104817->104824 104820 ef5639 104839 ef8db6 9 API calls __beginthreadex 104820->104839 104827 ef5438 _memset 104824->104827 104830 ef5453 104824->104830 104825 ef5443 104936 ef8b28 58 API calls __getptd_noexit 104825->104936 104827->104825 104827->104830 104835 ef5493 104827->104835 104828 ef5448 104937 ef8db6 9 API calls __beginthreadex 104828->104937 104840 ef5686 LeaveCriticalSection LeaveCriticalSection _fprintf 104830->104840 104832 ef55a4 _memset 104939 ef8b28 58 API calls __getptd_noexit 104832->104939 104835->104830 104835->104832 104841 ef46e6 104835->104841 104848 f00e5b 104835->104848 104916 f00ba7 104835->104916 104938 f00cc8 58 API calls 3 library calls 104835->104938 104838->104820 104839->104816 104840->104816 104842 ef4705 104841->104842 104843 ef46f0 104841->104843 104842->104835 104940 ef8b28 58 API calls __getptd_noexit 104843->104940 104845 ef46f5 104941 ef8db6 9 API calls __beginthreadex 104845->104941 104847 ef4700 104847->104835 104849 f00e93 104848->104849 104850 f00e7c 104848->104850 104852 f015cb 104849->104852 104855 f00ecd 104849->104855 104951 ef8af4 58 API calls __getptd_noexit 104850->104951 104967 ef8af4 58 API calls __getptd_noexit 104852->104967 104854 f00e81 104952 ef8b28 58 API calls __getptd_noexit 104854->104952 104858 f00ed5 104855->104858 104866 f00eec 104855->104866 104856 f015d0 104968 ef8b28 58 API calls __getptd_noexit 104856->104968 104953 ef8af4 58 API calls __getptd_noexit 104858->104953 104861 f00ee1 104969 ef8db6 9 API calls __beginthreadex 104861->104969 104862 f00e88 104862->104835 104863 f00eda 104954 ef8b28 58 API calls __getptd_noexit 104863->104954 104865 f00f01 104955 ef8af4 58 API calls __getptd_noexit 104865->104955 104866->104862 104866->104865 104869 f00f1b 104866->104869 104870 f00f39 104866->104870 104869->104865 104872 f00f26 104869->104872 104956 ef881d 58 API calls 2 library calls 104870->104956 104942 f05c6b 104872->104942 104873 f00f49 104875 f00f51 104873->104875 104876 f00f6c 104873->104876 104957 ef8b28 58 API calls __getptd_noexit 104875->104957 104959 f018c1 60 API calls 3 library calls 104876->104959 104877 f0103a 104879 f010b3 ReadFile 104877->104879 104884 f01050 GetConsoleMode 104877->104884 104882 f01593 GetLastError 104879->104882 104883 f010d5 104879->104883 104881 f00f56 104958 ef8af4 58 API calls __getptd_noexit 104881->104958 104886 f015a0 104882->104886 104887 f01093 104882->104887 104883->104882 104893 f010a5 104883->104893 104888 f010b0 104884->104888 104889 f01064 104884->104889 104965 ef8b28 58 API calls __getptd_noexit 104886->104965 104891 f01099 104887->104891 104960 ef8b07 58 API calls 3 library calls 104887->104960 104888->104879 104889->104888 104890 f0106a ReadConsoleW 104889->104890 104890->104893 104894 f0108d GetLastError 104890->104894 104891->104862 104898 ef2d55 _free 58 API calls 104891->104898 104893->104891 104899 f0110a 104893->104899 104902 f01377 104893->104902 104894->104887 104896 f015a5 104966 ef8af4 58 API calls __getptd_noexit 104896->104966 104898->104862 104901 f01176 ReadFile 104899->104901 104908 f011f7 104899->104908 104904 f01197 GetLastError 104901->104904 104914 f011a1 104901->104914 104902->104891 104903 f0147d ReadFile 104902->104903 104907 f014a0 GetLastError 104903->104907 104915 f014ae 104903->104915 104904->104914 104905 f012b4 104910 f01264 MultiByteToWideChar 104905->104910 104963 f018c1 60 API calls 3 library calls 104905->104963 104906 f012a4 104962 ef8b28 58 API calls __getptd_noexit 104906->104962 104907->104915 104908->104891 104908->104905 104908->104906 104908->104910 104910->104891 104910->104894 104914->104899 104961 f018c1 60 API calls 3 library calls 104914->104961 104915->104902 104964 f018c1 60 API calls 3 library calls 104915->104964 104917 f00bb2 104916->104917 104921 f00bc7 104916->104921 105003 ef8b28 58 API calls __getptd_noexit 104917->105003 104919 f00bb7 105004 ef8db6 9 API calls __beginthreadex 104919->105004 104923 f00bfc 104921->104923 104930 f00bc2 104921->104930 105005 f05fe4 58 API calls __malloc_crt 104921->105005 104924 ef46e6 __flsbuf 58 API calls 104923->104924 104925 f00c10 104924->104925 104970 f00d47 104925->104970 104927 f00c17 104928 ef46e6 __flsbuf 58 API calls 104927->104928 104927->104930 104929 f00c3a 104928->104929 104929->104930 104931 ef46e6 __flsbuf 58 API calls 104929->104931 104930->104835 104932 f00c46 104931->104932 104932->104930 104933 ef46e6 __flsbuf 58 API calls 104932->104933 104934 f00c53 104933->104934 104935 ef46e6 __flsbuf 58 API calls 104934->104935 104935->104930 104936->104828 104937->104830 104938->104835 104939->104828 104940->104845 104941->104847 104943 f05c83 104942->104943 104944 f05c76 104942->104944 104946 f05c8f 104943->104946 104947 ef8b28 __beginthreadex 58 API calls 104943->104947 104945 ef8b28 __beginthreadex 58 API calls 104944->104945 104948 f05c7b 104945->104948 104946->104877 104949 f05cb0 104947->104949 104948->104877 104950 ef8db6 __beginthreadex 9 API calls 104949->104950 104950->104948 104951->104854 104952->104862 104953->104863 104954->104861 104955->104863 104956->104873 104957->104881 104958->104862 104959->104872 104960->104891 104961->104914 104962->104891 104963->104910 104964->104915 104965->104896 104966->104891 104967->104856 104968->104861 104969->104862 104971 f00d53 _raise 104970->104971 104972 f00d60 104971->104972 104973 f00d77 104971->104973 104974 ef8af4 __close 58 API calls 104972->104974 104975 f00e3b 104973->104975 104978 f00d8b 104973->104978 104977 f00d65 104974->104977 104976 ef8af4 __close 58 API calls 104975->104976 104979 f00dae 104976->104979 104980 ef8b28 __beginthreadex 58 API calls 104977->104980 104981 f00db6 104978->104981 104982 f00da9 104978->104982 104987 ef8b28 __beginthreadex 58 API calls 104979->104987 104995 f00d6c _raise 104980->104995 104984 f00dc3 104981->104984 104985 f00dd8 104981->104985 104983 ef8af4 __close 58 API calls 104982->104983 104983->104979 104988 ef8af4 __close 58 API calls 104984->104988 104986 efd206 ___lock_fhandle 59 API calls 104985->104986 104990 f00dde 104986->104990 104991 f00dd0 104987->104991 104989 f00dc8 104988->104989 104992 ef8b28 __beginthreadex 58 API calls 104989->104992 104993 f00df1 104990->104993 104994 f00e04 104990->104994 104997 ef8db6 __beginthreadex 9 API calls 104991->104997 104992->104991 104996 f00e5b __read_nolock 70 API calls 104993->104996 104998 ef8b28 __beginthreadex 58 API calls 104994->104998 104995->104927 104999 f00dfd 104996->104999 104997->104995 105000 f00e09 104998->105000 105002 f00e33 __read LeaveCriticalSection 104999->105002 105001 ef8af4 __close 58 API calls 105000->105001 105001->104999 105002->104995 105003->104919 105004->104930 105005->104923 105009 ef520a GetSystemTimeAsFileTime 105006->105009 105008 f38f6e 105008->104601 105010 ef5238 __aulldiv 105009->105010 105010->105008 105012 ef5c6c _raise 105011->105012 105013 ef5c7e 105012->105013 105014 ef5c93 105012->105014 105025 ef8b28 58 API calls __getptd_noexit 105013->105025 105016 ef6c11 __lock_file 59 API calls 105014->105016 105018 ef5c99 105016->105018 105017 ef5c83 105026 ef8db6 9 API calls __beginthreadex 105017->105026 105027 ef58d0 67 API calls 6 library calls 105018->105027 105021 ef5ca4 105028 ef5cc4 LeaveCriticalSection LeaveCriticalSection _fprintf 105021->105028 105023 ef5cb6 105024 ef5c8e _raise 105023->105024 105024->104606 105025->105017 105026->105024 105027->105021 105028->105023 105029->104490 105030->104492 105031->104488 105032->104498 105034 ed9169 Mailbox 105033->105034 105035 f0f19f 105034->105035 105039 ed9173 105034->105039 105036 ef0db6 Mailbox 59 API calls 105035->105036 105038 f0f1ab 105036->105038 105037 ed917a 105037->104503 105039->105037 105041 ed9c90 105039->105041 105042 ed9c9b 105041->105042 105043 ed9cd2 105042->105043 105046 ed8cd4 59 API calls Mailbox 105042->105046 105043->105039 105045 ed9cfd 105045->105039 105046->105045 105047->104513 105048->104508 105052 f39748 __tzset_nolock _wcscmp 105049->105052 105050 f39109 GetSystemTimeAsFileTime 105050->105052 105051 f395dc 105051->104519 105051->104546 105052->105050 105052->105051 105053 ed4f0b 74 API calls 105052->105053 105054 ed4ee5 85 API calls 105052->105054 105053->105052 105054->105052 105056 f38b11 105055->105056 105057 f38b1f 105055->105057 105058 ef525b 115 API calls 105056->105058 105059 f38b64 105057->105059 105060 ef525b 115 API calls 105057->105060 105070 f38b28 105057->105070 105058->105057 105086 f38d91 105059->105086 105062 f38b49 105060->105062 105062->105059 105063 f38b52 105062->105063 105067 ef53a6 __fcloseall 83 API calls 105063->105067 105063->105070 105064 f38ba8 105065 f38bcd 105064->105065 105066 f38bac 105064->105066 105090 f389a9 105065->105090 105069 f38bb9 105066->105069 105072 ef53a6 __fcloseall 83 API calls 105066->105072 105067->105070 105069->105070 105075 ef53a6 __fcloseall 83 API calls 105069->105075 105070->104548 105072->105069 105073 f38bfb 105099 f38c2b 105073->105099 105074 f38bdb 105076 f38be8 105074->105076 105079 ef53a6 __fcloseall 83 API calls 105074->105079 105075->105070 105076->105070 105081 ef53a6 __fcloseall 83 API calls 105076->105081 105079->105076 105081->105070 105083 f38c16 105083->105070 105085 ef53a6 __fcloseall 83 API calls 105083->105085 105085->105070 105087 f38db6 105086->105087 105089 f38d9f __tzset_nolock _memmove 105086->105089 105088 ef55e2 __fread_nolock 74 API calls 105087->105088 105088->105089 105089->105064 105091 ef571c std::exception::_Copy_str 58 API calls 105090->105091 105092 f389b8 105091->105092 105093 ef571c std::exception::_Copy_str 58 API calls 105092->105093 105094 f389cc 105093->105094 105095 ef571c std::exception::_Copy_str 58 API calls 105094->105095 105096 f389e0 105095->105096 105097 f38d0d 58 API calls 105096->105097 105098 f389f3 105096->105098 105097->105098 105098->105073 105098->105074 105106 f38c40 105099->105106 105100 f38cf8 105132 f38f35 105100->105132 105102 f38c02 105107 f38d0d 105102->105107 105103 f38a05 74 API calls 105103->105106 105106->105100 105106->105102 105106->105103 105128 f38e12 105106->105128 105136 f38aa1 74 API calls 105106->105136 105108 f38d20 105107->105108 105109 f38d1a 105107->105109 105111 ef2d55 _free 58 API calls 105108->105111 105112 f38d31 105108->105112 105110 ef2d55 _free 58 API calls 105109->105110 105110->105108 105111->105112 105113 ef2d55 _free 58 API calls 105112->105113 105114 f38c09 105112->105114 105113->105114 105114->105083 105115 ef53a6 105114->105115 105116 ef53b2 _raise 105115->105116 105117 ef53de 105116->105117 105118 ef53c6 105116->105118 105121 ef6c11 __lock_file 59 API calls 105117->105121 105124 ef53d6 _raise 105117->105124 105185 ef8b28 58 API calls __getptd_noexit 105118->105185 105120 ef53cb 105186 ef8db6 9 API calls __beginthreadex 105120->105186 105123 ef53f0 105121->105123 105169 ef533a 105123->105169 105124->105083 105129 f38e21 105128->105129 105130 f38e61 105128->105130 105129->105106 105130->105129 105137 f38ee8 105130->105137 105133 f38f42 105132->105133 105134 f38f53 105132->105134 105135 ef4863 80 API calls 105133->105135 105134->105102 105135->105134 105136->105106 105138 f38f14 105137->105138 105140 f38f25 105137->105140 105141 ef4863 105138->105141 105140->105130 105142 ef486f _raise 105141->105142 105143 ef488d 105142->105143 105144 ef48a5 105142->105144 105146 ef489d _raise 105142->105146 105166 ef8b28 58 API calls __getptd_noexit 105143->105166 105147 ef6c11 __lock_file 59 API calls 105144->105147 105146->105140 105149 ef48ab 105147->105149 105148 ef4892 105167 ef8db6 9 API calls __beginthreadex 105148->105167 105154 ef470a 105149->105154 105157 ef4719 105154->105157 105160 ef4737 105154->105160 105155 ef4727 105156 ef8b28 __beginthreadex 58 API calls 105155->105156 105158 ef472c 105156->105158 105157->105155 105157->105160 105164 ef4751 _memmove 105157->105164 105159 ef8db6 __beginthreadex 9 API calls 105158->105159 105159->105160 105168 ef48dd LeaveCriticalSection LeaveCriticalSection _fprintf 105160->105168 105161 efae1e __flsbuf 78 API calls 105161->105164 105162 ef4a3d __flush 78 API calls 105162->105164 105163 ef46e6 __flsbuf 58 API calls 105163->105164 105164->105160 105164->105161 105164->105162 105164->105163 105165 efd886 __write 78 API calls 105164->105165 105165->105164 105166->105148 105167->105146 105168->105146 105170 ef535d 105169->105170 105171 ef5349 105169->105171 105173 ef5359 105170->105173 105188 ef4a3d 105170->105188 105224 ef8b28 58 API calls __getptd_noexit 105171->105224 105187 ef5415 LeaveCriticalSection LeaveCriticalSection _fprintf 105173->105187 105174 ef534e 105225 ef8db6 9 API calls __beginthreadex 105174->105225 105180 ef46e6 __flsbuf 58 API calls 105181 ef5377 105180->105181 105198 f00a02 105181->105198 105183 ef537d 105183->105173 105184 ef2d55 _free 58 API calls 105183->105184 105184->105173 105185->105120 105186->105124 105187->105124 105189 ef4a50 105188->105189 105193 ef4a74 105188->105193 105190 ef46e6 __flsbuf 58 API calls 105189->105190 105189->105193 105191 ef4a6d 105190->105191 105226 efd886 105191->105226 105194 f00b77 105193->105194 105195 ef5371 105194->105195 105196 f00b84 105194->105196 105195->105180 105196->105195 105197 ef2d55 _free 58 API calls 105196->105197 105197->105195 105199 f00a0e _raise 105198->105199 105200 f00a32 105199->105200 105201 f00a1b 105199->105201 105202 f00abd 105200->105202 105204 f00a42 105200->105204 105351 ef8af4 58 API calls __getptd_noexit 105201->105351 105356 ef8af4 58 API calls __getptd_noexit 105202->105356 105207 f00a60 105204->105207 105208 f00a6a 105204->105208 105206 f00a20 105352 ef8b28 58 API calls __getptd_noexit 105206->105352 105353 ef8af4 58 API calls __getptd_noexit 105207->105353 105212 efd206 ___lock_fhandle 59 API calls 105208->105212 105209 f00a65 105357 ef8b28 58 API calls __getptd_noexit 105209->105357 105214 f00a70 105212->105214 105216 f00a83 105214->105216 105217 f00a8e 105214->105217 105215 f00ac9 105358 ef8db6 9 API calls __beginthreadex 105215->105358 105336 f00add 105216->105336 105354 ef8b28 58 API calls __getptd_noexit 105217->105354 105220 f00a27 _raise 105220->105183 105222 f00a89 105355 f00ab5 LeaveCriticalSection __unlock_fhandle 105222->105355 105224->105174 105225->105173 105227 efd892 _raise 105226->105227 105228 efd89f 105227->105228 105229 efd8b6 105227->105229 105327 ef8af4 58 API calls __getptd_noexit 105228->105327 105231 efd955 105229->105231 105232 efd8ca 105229->105232 105333 ef8af4 58 API calls __getptd_noexit 105231->105333 105235 efd8e8 105232->105235 105236 efd8f2 105232->105236 105234 efd8a4 105328 ef8b28 58 API calls __getptd_noexit 105234->105328 105329 ef8af4 58 API calls __getptd_noexit 105235->105329 105254 efd206 105236->105254 105237 efd8ed 105334 ef8b28 58 API calls __getptd_noexit 105237->105334 105241 efd8f8 105243 efd91e 105241->105243 105244 efd90b 105241->105244 105330 ef8b28 58 API calls __getptd_noexit 105243->105330 105263 efd975 105244->105263 105245 efd961 105335 ef8db6 9 API calls __beginthreadex 105245->105335 105249 efd8ab _raise 105249->105193 105250 efd917 105332 efd94d LeaveCriticalSection __unlock_fhandle 105250->105332 105251 efd923 105331 ef8af4 58 API calls __getptd_noexit 105251->105331 105255 efd212 _raise 105254->105255 105256 efd261 EnterCriticalSection 105255->105256 105258 ef9c0b __lock 58 API calls 105255->105258 105257 efd287 _raise 105256->105257 105257->105241 105259 efd237 105258->105259 105260 efd24f 105259->105260 105261 ef9e2b ___lock_fhandle InitializeCriticalSectionAndSpinCount 105259->105261 105262 efd28b ___lock_fhandle LeaveCriticalSection 105260->105262 105261->105260 105262->105256 105264 efd982 __ftell_nolock 105263->105264 105265 efd9c1 105264->105265 105266 efd9e0 105264->105266 105296 efd9b6 105264->105296 105267 ef8af4 __close 58 API calls 105265->105267 105270 efda38 105266->105270 105271 efda1c 105266->105271 105269 efd9c6 105267->105269 105268 efc5f6 __woutput_l 6 API calls 105272 efe1d6 105268->105272 105273 ef8b28 __beginthreadex 58 API calls 105269->105273 105276 f018c1 __lseeki64_nolock 60 API calls 105270->105276 105280 efda51 105270->105280 105274 ef8af4 __close 58 API calls 105271->105274 105272->105250 105275 efd9cd 105273->105275 105278 efda21 105274->105278 105279 ef8db6 __beginthreadex 9 API calls 105275->105279 105276->105280 105277 f05c6b __flsbuf 58 API calls 105281 efda5f 105277->105281 105282 ef8b28 __beginthreadex 58 API calls 105278->105282 105279->105296 105280->105277 105283 efddb8 105281->105283 105288 ef99ac __beginthreadex 58 API calls 105281->105288 105284 efda28 105282->105284 105285 efe14b WriteFile 105283->105285 105286 efddd6 105283->105286 105287 ef8db6 __beginthreadex 9 API calls 105284->105287 105289 efddab GetLastError 105285->105289 105298 efdd78 105285->105298 105290 efdefa 105286->105290 105295 efddec 105286->105295 105287->105296 105291 efda8b GetConsoleMode 105288->105291 105289->105298 105301 efdf05 105290->105301 105304 efdfef 105290->105304 105291->105283 105293 efdaca 105291->105293 105292 efe184 105292->105296 105297 ef8b28 __beginthreadex 58 API calls 105292->105297 105293->105283 105299 efdada GetConsoleCP 105293->105299 105294 efde5b WriteFile 105294->105289 105300 efde98 105294->105300 105295->105292 105295->105294 105296->105268 105302 efe1b2 105297->105302 105298->105292 105298->105296 105303 efded8 105298->105303 105299->105292 105321 efdb09 105299->105321 105300->105295 105306 efdebc 105300->105306 105301->105292 105307 efdf6a WriteFile 105301->105307 105308 ef8af4 __close 58 API calls 105302->105308 105309 efe17b 105303->105309 105310 efdee3 105303->105310 105304->105292 105305 efe064 WideCharToMultiByte 105304->105305 105305->105289 105319 efe0ab 105305->105319 105306->105298 105307->105289 105311 efdfb9 105307->105311 105308->105296 105313 ef8b07 __dosmaperr 58 API calls 105309->105313 105312 ef8b28 __beginthreadex 58 API calls 105310->105312 105311->105298 105311->105301 105311->105306 105315 efdee8 105312->105315 105313->105296 105314 efe0b3 WriteFile 105317 efe106 GetLastError 105314->105317 105314->105319 105318 ef8af4 __close 58 API calls 105315->105318 105316 ef35f5 __write_nolock 58 API calls 105316->105321 105317->105319 105318->105296 105319->105298 105319->105304 105319->105306 105319->105314 105320 f062ba 60 API calls __write_nolock 105320->105321 105321->105298 105321->105316 105321->105320 105322 efdbf2 WideCharToMultiByte 105321->105322 105325 efdc5f 105321->105325 105322->105298 105323 efdc2d WriteFile 105322->105323 105323->105289 105323->105325 105324 f07a5e WriteConsoleW CreateFileW __putwch_nolock 105324->105325 105325->105289 105325->105298 105325->105321 105325->105324 105326 efdc87 WriteFile 105325->105326 105326->105289 105326->105325 105327->105234 105328->105249 105329->105237 105330->105251 105331->105250 105332->105249 105333->105237 105334->105245 105335->105249 105359 efd4c3 105336->105359 105338 f00aeb 105339 f00b41 105338->105339 105341 f00b1f 105338->105341 105343 efd4c3 __lseeki64_nolock 58 API calls 105338->105343 105372 efd43d 59 API calls 2 library calls 105339->105372 105341->105339 105344 efd4c3 __lseeki64_nolock 58 API calls 105341->105344 105342 f00b49 105345 f00b6b 105342->105345 105373 ef8b07 58 API calls 3 library calls 105342->105373 105346 f00b16 105343->105346 105347 f00b2b CloseHandle 105344->105347 105345->105222 105349 efd4c3 __lseeki64_nolock 58 API calls 105346->105349 105347->105339 105350 f00b37 GetLastError 105347->105350 105349->105341 105350->105339 105351->105206 105352->105220 105353->105209 105354->105222 105355->105220 105356->105209 105357->105215 105358->105220 105360 efd4ce 105359->105360 105361 efd4e3 105359->105361 105362 ef8af4 __close 58 API calls 105360->105362 105363 ef8af4 __close 58 API calls 105361->105363 105365 efd508 105361->105365 105364 efd4d3 105362->105364 105366 efd512 105363->105366 105367 ef8b28 __beginthreadex 58 API calls 105364->105367 105365->105338 105368 ef8b28 __beginthreadex 58 API calls 105366->105368 105369 efd4db 105367->105369 105370 efd51a 105368->105370 105369->105338 105371 ef8db6 __beginthreadex 9 API calls 105370->105371 105371->105369 105372->105342 105373->105345 105375 f01940 __ftell_nolock 105374->105375 105376 ef079e GetLongPathNameW 105375->105376 105377 ed7bcc 59 API calls 105376->105377 105378 ed72bd 105377->105378 105379 ed700b 105378->105379 105380 ed7667 59 API calls 105379->105380 105381 ed701d 105380->105381 105382 ed4750 60 API calls 105381->105382 105383 ed7028 105382->105383 105384 f0e885 105383->105384 105385 ed7033 105383->105385 105390 f0e89f 105384->105390 105432 ed7908 61 API calls 105384->105432 105387 ed3f74 59 API calls 105385->105387 105388 ed703f 105387->105388 105426 ed34c2 105388->105426 105391 ed7052 Mailbox 105391->104319 105393 ed4ddd 136 API calls 105392->105393 105394 ed688f 105393->105394 105395 f0e031 105394->105395 105396 ed4ddd 136 API calls 105394->105396 105397 f3955b 122 API calls 105395->105397 105398 ed68a3 105396->105398 105399 f0e046 105397->105399 105398->105395 105402 ed68ab 105398->105402 105400 f0e067 105399->105400 105401 f0e04a 105399->105401 105404 ef0db6 Mailbox 59 API calls 105400->105404 105403 ed4e4a 84 API calls 105401->105403 105405 f0e052 105402->105405 105406 ed68b7 105402->105406 105403->105405 105418 f0e0ac Mailbox 105404->105418 105540 f342f8 90 API calls _wprintf 105405->105540 105433 ed6a8c 105406->105433 105409 f0e060 105409->105400 105411 f0e260 105412 ef2d55 _free 58 API calls 105411->105412 105413 f0e268 105412->105413 105414 ed4e4a 84 API calls 105413->105414 105416 f0e271 105414->105416 105420 ef2d55 _free 58 API calls 105416->105420 105422 ed4e4a 84 API calls 105416->105422 105544 f2f7a1 89 API calls 4 library calls 105416->105544 105418->105411 105418->105416 105423 ed7de1 59 API calls 105418->105423 105526 ed750f 105418->105526 105534 ed735d 105418->105534 105541 f2f73d 59 API calls 2 library calls 105418->105541 105542 f2f65e 61 API calls 2 library calls 105418->105542 105543 f3737f 59 API calls Mailbox 105418->105543 105420->105416 105422->105416 105423->105418 105427 ed34d4 105426->105427 105431 ed34f3 _memmove 105426->105431 105429 ef0db6 Mailbox 59 API calls 105427->105429 105428 ef0db6 Mailbox 59 API calls 105430 ed350a 105428->105430 105429->105431 105430->105391 105431->105428 105432->105384 105434 ed6ab5 105433->105434 105435 f0e41e 105433->105435 105550 ed57a6 60 API calls Mailbox 105434->105550 105636 f2f7a1 89 API calls 4 library calls 105435->105636 105438 ed6ad7 105551 ed57f6 105438->105551 105439 f0e431 105637 f2f7a1 89 API calls 4 library calls 105439->105637 105443 ed6af4 105445 ed7667 59 API calls 105443->105445 105444 f0e44d 105447 ed6b61 105444->105447 105446 ed6b00 105445->105446 105564 ef0957 60 API calls __ftell_nolock 105446->105564 105450 f0e460 105447->105450 105451 ed6b6f 105447->105451 105449 ed6b0c 105452 ed7667 59 API calls 105449->105452 105453 ed5c6f CloseHandle 105450->105453 105454 ed7667 59 API calls 105451->105454 105455 ed6b18 105452->105455 105456 f0e46c 105453->105456 105457 ed6b78 105454->105457 105458 ed4750 60 API calls 105455->105458 105459 ed4ddd 136 API calls 105456->105459 105460 ed7667 59 API calls 105457->105460 105461 ed6b26 105458->105461 105462 f0e488 105459->105462 105463 ed6b81 105460->105463 105565 ed5850 ReadFile SetFilePointerEx 105461->105565 105465 f0e4b1 105462->105465 105469 f3955b 122 API calls 105462->105469 105574 ed459b 105463->105574 105638 f2f7a1 89 API calls 4 library calls 105465->105638 105468 ed6b52 105566 ed5aee 105468->105566 105474 f0e4a4 105469->105474 105472 f0e4c8 105504 ed6d0c Mailbox 105472->105504 105476 f0e4ac 105474->105476 105477 f0e4cd 105474->105477 105479 ed4e4a 84 API calls 105476->105479 105478 ed4e4a 84 API calls 105477->105478 105480 f0e4d2 105478->105480 105479->105465 105481 ef0db6 Mailbox 59 API calls 105480->105481 105488 f0e506 105481->105488 105485 ed3bbb 105485->104178 105485->104187 105489 ed750f 59 API calls 105488->105489 105523 f0e54f Mailbox 105489->105523 105493 f0e740 105643 f372df 59 API calls Mailbox 105493->105643 105497 f0e762 105644 f4fbce 59 API calls 2 library calls 105497->105644 105500 f0e76f 105502 ef2d55 _free 58 API calls 105500->105502 105502->105504 105545 ed57d4 105504->105545 105506 ed750f 59 API calls 105506->105523 105516 ed7de1 59 API calls 105516->105523 105520 f0e792 105645 f2f7a1 89 API calls 4 library calls 105520->105645 105522 f0e7ab 105524 ef2d55 _free 58 API calls 105522->105524 105523->105493 105523->105506 105523->105516 105523->105520 105639 f2f73d 59 API calls 2 library calls 105523->105639 105640 f2f65e 61 API calls 2 library calls 105523->105640 105641 f3737f 59 API calls Mailbox 105523->105641 105642 ed7213 59 API calls Mailbox 105523->105642 105525 f0e7be 105524->105525 105525->105504 105527 ed75af 105526->105527 105531 ed7522 _memmove 105526->105531 105529 ef0db6 Mailbox 59 API calls 105527->105529 105528 ef0db6 Mailbox 59 API calls 105530 ed7529 105528->105530 105529->105531 105532 ef0db6 Mailbox 59 API calls 105530->105532 105533 ed7552 105530->105533 105531->105528 105532->105533 105533->105418 105535 ed7370 105534->105535 105538 ed741e 105534->105538 105536 ef0db6 Mailbox 59 API calls 105535->105536 105539 ed73a2 105535->105539 105536->105539 105537 ef0db6 59 API calls Mailbox 105537->105539 105538->105418 105539->105537 105539->105538 105540->105409 105541->105418 105542->105418 105543->105418 105544->105416 105546 ed5c6f CloseHandle 105545->105546 105547 ed57dc Mailbox 105546->105547 105548 ed5c6f CloseHandle 105547->105548 105549 ed57eb 105548->105549 105549->105485 105550->105438 105552 ed5c6f CloseHandle 105551->105552 105553 ed5802 105552->105553 105648 ed5c99 105553->105648 105555 ed5821 105556 ed5844 105555->105556 105656 ed5610 105555->105656 105556->105439 105556->105443 105558 ed5833 105673 ed527b SetFilePointerEx SetFilePointerEx 105558->105673 105560 ed583a 105560->105556 105561 f0dc07 105560->105561 105674 f3345a SetFilePointerEx SetFilePointerEx WriteFile 105561->105674 105563 f0dc37 105563->105556 105564->105449 105565->105468 105571 ed5b08 105566->105571 105567 ed5b8f SetFilePointerEx 105680 ed5c4e SetFilePointerEx 105567->105680 105568 f0dd28 105681 ed5c4e SetFilePointerEx 105568->105681 105571->105567 105571->105568 105573 ed5b63 105571->105573 105572 f0dd42 105573->105447 105575 ed7667 59 API calls 105574->105575 105576 ed45b1 105575->105576 105577 ed7667 59 API calls 105576->105577 105578 ed45b9 105577->105578 105579 ed7667 59 API calls 105578->105579 105580 ed45c1 105579->105580 105581 ed7667 59 API calls 105580->105581 105582 ed45c9 105581->105582 105583 ed45fd 105582->105583 105584 f0d4d2 105582->105584 105585 ed784b 59 API calls 105583->105585 105586 ed8047 59 API calls 105584->105586 105587 ed460b 105585->105587 105588 f0d4db 105586->105588 105589 ed7d2c 59 API calls 105587->105589 105590 ed7d8c 59 API calls 105588->105590 105591 ed4615 105589->105591 105593 ed4640 105590->105593 105592 ed784b 59 API calls 105591->105592 105591->105593 105595 ed4636 105592->105595 105596 ed465f 105593->105596 105597 f0d4fb 105593->105597 105611 ed4680 105593->105611 105601 ed79f2 59 API calls 105596->105601 105600 f0d5cb 105597->105600 105609 f0d5b4 105597->105609 105618 f0d532 105597->105618 105609->105600 105682 ed784b 105611->105682 105636->105439 105637->105444 105638->105472 105639->105523 105640->105523 105641->105523 105642->105523 105643->105497 105644->105500 105645->105522 105649 f0dd58 105648->105649 105650 ed5cb2 CreateFileW 105648->105650 105651 f0dd5e CreateFileW 105649->105651 105653 ed5cd4 105649->105653 105650->105653 105652 f0dd84 105651->105652 105651->105653 105654 ed5aee 2 API calls 105652->105654 105653->105555 105655 f0dd8f 105654->105655 105655->105653 105657 f0dba5 105656->105657 105658 ed562b 105656->105658 105672 ed56ba 105657->105672 105675 ed5cdf 105657->105675 105659 ed5aee 2 API calls 105658->105659 105658->105672 105660 ed564d 105659->105660 105661 ed522e 59 API calls 105660->105661 105663 ed5657 105661->105663 105663->105657 105664 ed5664 105663->105664 105665 ef0db6 Mailbox 59 API calls 105664->105665 105666 ed566f 105665->105666 105667 ed522e 59 API calls 105666->105667 105668 ed567a 105667->105668 105669 ed5bc0 2 API calls 105668->105669 105670 ed56a7 105669->105670 105671 ed5aee 2 API calls 105670->105671 105671->105672 105672->105558 105673->105560 105674->105563 105676 ed5aee 2 API calls 105675->105676 105677 ed5d00 105676->105677 105678 ed5aee 2 API calls 105677->105678 105679 ed5d14 105678->105679 105679->105672 105680->105573 105681->105572 105699 ed6d95 105697->105699 106216 ed1066 106221 edf76f 106216->106221 106218 ed106c 106219 ef2d40 __cinit 67 API calls 106218->106219 106220 ed1076 106219->106220 106222 edf790 106221->106222 106254 eeff03 106222->106254 106226 edf7d7 106227 ed7667 59 API calls 106226->106227 106228 edf7e1 106227->106228 106229 ed7667 59 API calls 106228->106229 106230 edf7eb 106229->106230 106231 ed7667 59 API calls 106230->106231 106232 edf7f5 106231->106232 106233 ed7667 59 API calls 106232->106233 106234 edf833 106233->106234 106235 ed7667 59 API calls 106234->106235 106236 edf8fe 106235->106236 106264 ee5f87 106236->106264 106240 edf930 106241 ed7667 59 API calls 106240->106241 106242 edf93a 106241->106242 106292 eefd9e 106242->106292 106244 edf981 106245 edf991 GetStdHandle 106244->106245 106246 edf9dd 106245->106246 106247 f145ab 106245->106247 106248 edf9e5 OleInitialize 106246->106248 106247->106246 106249 f145b4 106247->106249 106248->106218 106299 f36b38 64 API calls Mailbox 106249->106299 106251 f145bb 106300 f37207 CreateThread 106251->106300 106253 f145c7 CloseHandle 106253->106248 106301 eeffdc 106254->106301 106257 eeffdc 59 API calls 106258 eeff45 106257->106258 106259 ed7667 59 API calls 106258->106259 106260 eeff51 106259->106260 106261 ed7bcc 59 API calls 106260->106261 106262 edf796 106261->106262 106263 ef0162 6 API calls 106262->106263 106263->106226 106265 ed7667 59 API calls 106264->106265 106266 ee5f97 106265->106266 106267 ed7667 59 API calls 106266->106267 106268 ee5f9f 106267->106268 106308 ee5a9d 106268->106308 106271 ee5a9d 59 API calls 106272 ee5faf 106271->106272 106273 ed7667 59 API calls 106272->106273 106274 ee5fba 106273->106274 106275 ef0db6 Mailbox 59 API calls 106274->106275 106276 edf908 106275->106276 106277 ee60f9 106276->106277 106278 ee6107 106277->106278 106279 ed7667 59 API calls 106278->106279 106280 ee6112 106279->106280 106281 ed7667 59 API calls 106280->106281 106282 ee611d 106281->106282 106283 ed7667 59 API calls 106282->106283 106284 ee6128 106283->106284 106285 ed7667 59 API calls 106284->106285 106286 ee6133 106285->106286 106287 ee5a9d 59 API calls 106286->106287 106288 ee613e 106287->106288 106289 ef0db6 Mailbox 59 API calls 106288->106289 106290 ee6145 RegisterWindowMessageW 106289->106290 106290->106240 106293 eefdae 106292->106293 106294 f2576f 106292->106294 106295 ef0db6 Mailbox 59 API calls 106293->106295 106311 f39ae7 60 API calls 106294->106311 106297 eefdb6 106295->106297 106297->106244 106298 f2577a 106299->106251 106300->106253 106312 f371ed 65 API calls 106300->106312 106302 ed7667 59 API calls 106301->106302 106303 eeffe7 106302->106303 106304 ed7667 59 API calls 106303->106304 106305 eeffef 106304->106305 106306 ed7667 59 API calls 106305->106306 106307 eeff3b 106306->106307 106307->106257 106309 ed7667 59 API calls 106308->106309 106310 ee5aa5 106309->106310 106310->106271 106311->106298 106313 ed1016 106318 ed4974 106313->106318 106316 ef2d40 __cinit 67 API calls 106317 ed1025 106316->106317 106319 ef0db6 Mailbox 59 API calls 106318->106319 106320 ed497c 106319->106320 106321 ed101b 106320->106321 106325 ed4936 106320->106325 106321->106316 106326 ed493f 106325->106326 106327 ed4951 106325->106327 106328 ef2d40 __cinit 67 API calls 106326->106328 106329 ed49a0 106327->106329 106328->106327 106330 ed7667 59 API calls 106329->106330 106331 ed49b8 GetVersionExW 106330->106331 106332 ed7bcc 59 API calls 106331->106332 106333 ed49fb 106332->106333 106334 ed7d2c 59 API calls 106333->106334 106339 ed4a28 106333->106339 106335 ed4a1c 106334->106335 106336 ed7726 59 API calls 106335->106336 106336->106339 106337 ed4a93 GetCurrentProcess IsWow64Process 106338 ed4aac 106337->106338 106341 ed4b2b GetSystemInfo 106338->106341 106342 ed4ac2 106338->106342 106339->106337 106340 f0d864 106339->106340 106343 ed4af8 106341->106343 106353 ed4b37 106342->106353 106343->106321 106346 ed4b1f GetSystemInfo 106348 ed4ae9 106346->106348 106347 ed4ad4 106349 ed4b37 2 API calls 106347->106349 106348->106343 106350 ed4aef FreeLibrary 106348->106350 106351 ed4adc GetNativeSystemInfo 106349->106351 106350->106343 106351->106348 106354 ed4ad0 106353->106354 106355 ed4b40 LoadLibraryA 106353->106355 106354->106346 106354->106347 106355->106354 106356 ed4b51 GetProcAddress 106355->106356 106356->106354 106357 f0fdfc 106361 edab30 Mailbox _memmove 106357->106361 106359 f2617e Mailbox 59 API calls 106375 eda057 106359->106375 106360 ed9c90 Mailbox 59 API calls 106360->106361 106361->106360 106362 edb525 106361->106362 106366 ed9f37 Mailbox 106361->106366 106361->106375 106384 ed7de1 59 API calls 106361->106384 106387 f4bc6b 341 API calls 106361->106387 106390 edb2b6 106361->106390 106392 ed9ea0 341 API calls 106361->106392 106393 f1086a 106361->106393 106395 f10878 106361->106395 106397 f1085c 106361->106397 106398 edb21c 106361->106398 106400 ef0db6 59 API calls Mailbox 106361->106400 106403 f26e8f 59 API calls 106361->106403 106408 f3d07b 106361->106408 106455 f4df23 106361->106455 106458 ee1fc3 106361->106458 106498 f3d07a 106361->106498 106545 f4c2e0 106361->106545 106577 f37956 106361->106577 106583 f2617e 106361->106583 106591 f4c193 85 API calls 2 library calls 106361->106591 106593 f39e4a 89 API calls 4 library calls 106362->106593 106365 edb47a 106367 f109e5 106365->106367 106368 f10055 106365->106368 106366->106365 106366->106368 106369 ef0db6 59 API calls Mailbox 106366->106369 106371 edb475 106366->106371 106366->106375 106380 ed8047 59 API calls 106366->106380 106381 ed7667 59 API calls 106366->106381 106382 f26e8f 59 API calls 106366->106382 106383 ef2d40 67 API calls __cinit 106366->106383 106385 f109d6 106366->106385 106388 eda55a 106366->106388 106586 edc8c0 341 API calls 2 library calls 106366->106586 106587 edb900 60 API calls Mailbox 106366->106587 106597 f39e4a 89 API calls 4 library calls 106367->106597 106592 f39e4a 89 API calls 4 library calls 106368->106592 106369->106366 106376 ed8047 59 API calls 106371->106376 106374 f10064 106376->106375 106380->106366 106381->106366 106382->106366 106383->106366 106384->106361 106596 f39e4a 89 API calls 4 library calls 106385->106596 106387->106361 106595 f39e4a 89 API calls 4 library calls 106388->106595 106590 edf6a3 341 API calls 106390->106590 106392->106361 106394 ed9c90 Mailbox 59 API calls 106393->106394 106394->106397 106594 f39e4a 89 API calls 4 library calls 106395->106594 106397->106359 106397->106375 106588 ed9d3c 60 API calls Mailbox 106398->106588 106400->106361 106401 edb22d 106589 ed9d3c 60 API calls Mailbox 106401->106589 106403->106361 106409 f3d0a5 106408->106409 106410 f3d09a 106408->106410 106412 f3d17f Mailbox 106409->106412 106415 ed7667 59 API calls 106409->106415 106598 ed9b3c 59 API calls 106410->106598 106413 ef0db6 Mailbox 59 API calls 106412->106413 106449 f3d188 Mailbox 106412->106449 106414 f3d1c8 106413->106414 106416 f3d1d4 106414->106416 106601 ed57a6 60 API calls Mailbox 106414->106601 106417 f3d0c9 106415->106417 106420 ed9837 84 API calls 106416->106420 106419 ed7667 59 API calls 106417->106419 106421 f3d0d2 106419->106421 106423 f3d1ec 106420->106423 106422 ed9837 84 API calls 106421->106422 106424 f3d0de 106422->106424 106425 ed57f6 67 API calls 106423->106425 106427 ed459b 59 API calls 106424->106427 106426 f3d1fb 106425->106426 106428 f3d233 106426->106428 106429 f3d1ff GetLastError 106426->106429 106430 f3d0f3 106427->106430 106434 f3d295 106428->106434 106435 f3d25e 106428->106435 106431 f3d218 106429->106431 106432 ed7b2e 59 API calls 106430->106432 106431->106449 106602 ed58ba CloseHandle 106431->106602 106433 f3d126 106432->106433 106436 f3d178 106433->106436 106442 f33c37 3 API calls 106433->106442 106437 ef0db6 Mailbox 59 API calls 106434->106437 106438 ef0db6 Mailbox 59 API calls 106435->106438 106600 ed9b3c 59 API calls 106436->106600 106443 f3d29a 106437->106443 106439 f3d263 106438->106439 106444 f3d274 106439->106444 106446 ed7667 59 API calls 106439->106446 106445 f3d136 106442->106445 106448 ed7667 59 API calls 106443->106448 106443->106449 106603 f4fbce 59 API calls 2 library calls 106444->106603 106445->106436 106447 f3d13a 106445->106447 106446->106444 106451 ed7de1 59 API calls 106447->106451 106448->106449 106449->106361 106452 f3d147 106451->106452 106599 f33a2a 63 API calls Mailbox 106452->106599 106454 f3d150 Mailbox 106454->106436 106456 f4cadd 130 API calls 106455->106456 106457 f4df33 106456->106457 106457->106361 106459 ed9a98 59 API calls 106458->106459 106460 ee1fdb 106459->106460 106461 ef0db6 Mailbox 59 API calls 106460->106461 106465 f16585 106460->106465 106463 ee1ff4 106461->106463 106464 ee2004 106463->106464 106619 ed57a6 60 API calls Mailbox 106463->106619 106468 ed9837 84 API calls 106464->106468 106466 ee2029 106465->106466 106623 f3f574 59 API calls 106465->106623 106474 ee2036 106466->106474 106624 ed9b3c 59 API calls 106466->106624 106470 ee2012 106468->106470 106472 ed57f6 67 API calls 106470->106472 106471 f165cd 106473 f165d5 106471->106473 106471->106474 106475 ee2021 106472->106475 106625 ed9b3c 59 API calls 106473->106625 106477 ed5cdf 2 API calls 106474->106477 106475->106465 106475->106466 106622 ed58ba CloseHandle 106475->106622 106479 ee203d 106477->106479 106480 f165e7 106479->106480 106481 ee2057 106479->106481 106483 ef0db6 Mailbox 59 API calls 106480->106483 106482 ed7667 59 API calls 106481->106482 106484 ee205f 106482->106484 106485 f165ed 106483->106485 106604 ed5572 106484->106604 106487 f16601 106485->106487 106626 ed5850 ReadFile SetFilePointerEx 106485->106626 106492 f16605 _memmove 106487->106492 106627 f376c4 59 API calls 2 library calls 106487->106627 106489 ee206e 106489->106492 106620 ed9a3c 59 API calls Mailbox 106489->106620 106493 ee2082 Mailbox 106494 ee20bc 106493->106494 106495 ed5c6f CloseHandle 106493->106495 106494->106361 106496 ee20b0 106495->106496 106496->106494 106621 ed58ba CloseHandle 106496->106621 106499 f3d0a5 106498->106499 106500 f3d09a 106498->106500 106504 ed7667 59 API calls 106499->106504 106534 f3d17f Mailbox 106499->106534 106631 ed9b3c 59 API calls 106500->106631 106502 ef0db6 Mailbox 59 API calls 106503 f3d1c8 106502->106503 106505 f3d1d4 106503->106505 106634 ed57a6 60 API calls Mailbox 106503->106634 106506 f3d0c9 106504->106506 106509 ed9837 84 API calls 106505->106509 106508 ed7667 59 API calls 106506->106508 106510 f3d0d2 106508->106510 106512 f3d1ec 106509->106512 106511 ed9837 84 API calls 106510->106511 106513 f3d0de 106511->106513 106514 ed57f6 67 API calls 106512->106514 106516 ed459b 59 API calls 106513->106516 106515 f3d1fb 106514->106515 106517 f3d233 106515->106517 106518 f3d1ff GetLastError 106515->106518 106519 f3d0f3 106516->106519 106523 f3d295 106517->106523 106524 f3d25e 106517->106524 106520 f3d218 106518->106520 106521 ed7b2e 59 API calls 106519->106521 106541 f3d188 Mailbox 106520->106541 106635 ed58ba CloseHandle 106520->106635 106522 f3d126 106521->106522 106525 f3d178 106522->106525 106531 f33c37 3 API calls 106522->106531 106526 ef0db6 Mailbox 59 API calls 106523->106526 106527 ef0db6 Mailbox 59 API calls 106524->106527 106633 ed9b3c 59 API calls 106525->106633 106532 f3d29a 106526->106532 106528 f3d263 106527->106528 106533 f3d274 106528->106533 106536 ed7667 59 API calls 106528->106536 106535 f3d136 106531->106535 106538 ed7667 59 API calls 106532->106538 106532->106541 106636 f4fbce 59 API calls 2 library calls 106533->106636 106534->106502 106534->106541 106535->106525 106537 f3d13a 106535->106537 106536->106533 106540 ed7de1 59 API calls 106537->106540 106538->106541 106542 f3d147 106540->106542 106541->106361 106632 f33a2a 63 API calls Mailbox 106542->106632 106544 f3d150 Mailbox 106544->106525 106546 ed7667 59 API calls 106545->106546 106547 f4c2f4 106546->106547 106548 ed7667 59 API calls 106547->106548 106549 f4c2fc 106548->106549 106550 ed7667 59 API calls 106549->106550 106551 f4c304 106550->106551 106552 ed9837 84 API calls 106551->106552 106575 f4c312 106552->106575 106553 ed7bcc 59 API calls 106553->106575 106554 ed7924 59 API calls 106554->106575 106555 f4c4fb 106556 f4c528 Mailbox 106555->106556 106638 ed9a3c 59 API calls Mailbox 106555->106638 106556->106361 106557 f4c4e2 106561 ed7cab 59 API calls 106557->106561 106559 f4c4fd 106562 ed7cab 59 API calls 106559->106562 106560 ed8047 59 API calls 106560->106575 106563 f4c4ef 106561->106563 106565 f4c50c 106562->106565 106564 ed7b2e 59 API calls 106563->106564 106564->106555 106567 ed7b2e 59 API calls 106565->106567 106566 ed7e4f 59 API calls 106569 f4c3a9 CharUpperBuffW 106566->106569 106567->106555 106568 ed7e4f 59 API calls 106570 f4c469 CharUpperBuffW 106568->106570 106637 ed843a 68 API calls 106569->106637 106572 edc5a7 69 API calls 106570->106572 106572->106575 106573 ed9837 84 API calls 106573->106575 106574 ed7cab 59 API calls 106574->106575 106575->106553 106575->106554 106575->106555 106575->106556 106575->106557 106575->106559 106575->106560 106575->106566 106575->106568 106575->106573 106575->106574 106576 ed7b2e 59 API calls 106575->106576 106576->106575 106578 f37962 106577->106578 106579 ef0db6 Mailbox 59 API calls 106578->106579 106580 f37970 106579->106580 106581 f3797e 106580->106581 106582 ed7667 59 API calls 106580->106582 106581->106361 106582->106581 106639 f260c0 106583->106639 106585 f2618c 106585->106361 106586->106366 106587->106366 106588->106401 106589->106390 106590->106362 106591->106361 106592->106374 106593->106397 106594->106397 106595->106375 106596->106367 106597->106375 106598->106409 106599->106454 106600->106412 106601->106416 106602->106449 106603->106449 106605 ed557d 106604->106605 106606 ed55a2 106604->106606 106605->106606 106611 ed558c 106605->106611 106607 ed7d8c 59 API calls 106606->106607 106610 f3325e 106607->106610 106608 f3328d 106608->106489 106610->106608 106628 f331fa ReadFile SetFilePointerEx 106610->106628 106629 ed7924 59 API calls 2 library calls 106610->106629 106612 ed5ab8 59 API calls 106611->106612 106614 f3337e 106612->106614 106615 ed54d2 61 API calls 106614->106615 106616 f3338c 106615->106616 106618 f3339c Mailbox 106616->106618 106630 ed77da 61 API calls Mailbox 106616->106630 106618->106489 106619->106464 106620->106493 106621->106494 106622->106465 106623->106465 106624->106471 106625->106479 106626->106487 106627->106492 106628->106610 106629->106610 106630->106618 106631->106499 106632->106544 106633->106534 106634->106505 106635->106541 106636->106541 106637->106575 106638->106556 106640 f260cb 106639->106640 106641 f260e8 106639->106641 106640->106641 106643 f260ab 59 API calls Mailbox 106640->106643 106641->106585 106643->106640 106644 ed3633 106645 ed366a 106644->106645 106646 ed3688 106645->106646 106647 ed36e7 106645->106647 106684 ed36e5 106645->106684 106651 ed374b PostQuitMessage 106646->106651 106652 ed3695 106646->106652 106649 ed36ed 106647->106649 106650 f0d0cc 106647->106650 106648 ed36ca DefWindowProcW 106686 ed36d8 106648->106686 106653 ed3715 SetTimer RegisterWindowMessageW 106649->106653 106654 ed36f2 106649->106654 106693 ee1070 10 API calls Mailbox 106650->106693 106651->106686 106656 f0d154 106652->106656 106657 ed36a0 106652->106657 106661 ed373e CreatePopupMenu 106653->106661 106653->106686 106658 ed36f9 KillTimer 106654->106658 106659 f0d06f 106654->106659 106698 f32527 71 API calls _memset 106656->106698 106662 ed36a8 106657->106662 106663 ed3755 106657->106663 106689 ed443a Shell_NotifyIconW _memset 106658->106689 106665 f0d074 106659->106665 106666 f0d0a8 MoveWindow 106659->106666 106660 f0d0f3 106694 ee1093 341 API calls Mailbox 106660->106694 106661->106686 106669 ed36b3 106662->106669 106676 f0d139 106662->106676 106691 ed44a0 64 API calls _memset 106663->106691 106673 f0d097 SetFocus 106665->106673 106674 f0d078 106665->106674 106666->106686 106677 ed36be 106669->106677 106678 f0d124 106669->106678 106670 f0d166 106670->106648 106670->106686 106672 ed3764 106672->106686 106673->106686 106674->106677 106679 f0d081 106674->106679 106675 ed370c 106690 ed3114 DeleteObject DestroyWindow Mailbox 106675->106690 106676->106648 106697 f27c36 59 API calls Mailbox 106676->106697 106677->106648 106695 ed443a Shell_NotifyIconW _memset 106677->106695 106696 f32d36 81 API calls _memset 106678->106696 106692 ee1070 10 API calls Mailbox 106679->106692 106684->106648 106687 f0d118 106688 ed434a 68 API calls 106687->106688 106688->106684 106689->106675 106690->106686 106691->106672 106692->106686 106693->106660 106694->106677 106695->106687 106696->106672 106697->106684 106698->106670 106699 17eb6d0 106700 17e9320 GetPEB 106699->106700 106701 17eb7b0 106700->106701 106713 17eb5c0 106701->106713 106714 17eb5c9 Sleep 106713->106714 106715 17eb5d7 106714->106715

                                                        Control-flow Graph

                                                        APIs
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00ED3B68
                                                        • IsDebuggerPresent.KERNEL32 ref: 00ED3B7A
                                                        • GetFullPathNameW.KERNEL32(00007FFF,?,?,00F952F8,00F952E0,?,?), ref: 00ED3BEB
                                                          • Part of subcall function 00ED7BCC: _memmove.LIBCMT ref: 00ED7C06
                                                          • Part of subcall function 00EE092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00ED3C14,00F952F8,?,?,?), ref: 00EE096E
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00ED3C6F
                                                        • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00F87770,00000010), ref: 00F0D281
                                                        • SetCurrentDirectoryW.KERNEL32(?,00F952F8,?,?,?), ref: 00F0D2B9
                                                        • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00F84260,00F952F8,?,?,?), ref: 00F0D33F
                                                        • ShellExecuteW.SHELL32(00000000,?,?), ref: 00F0D346
                                                          • Part of subcall function 00ED3A46: GetSysColorBrush.USER32(0000000F), ref: 00ED3A50
                                                          • Part of subcall function 00ED3A46: LoadCursorW.USER32(00000000,00007F00), ref: 00ED3A5F
                                                          • Part of subcall function 00ED3A46: LoadIconW.USER32(00000063), ref: 00ED3A76
                                                          • Part of subcall function 00ED3A46: LoadIconW.USER32(000000A4), ref: 00ED3A88
                                                          • Part of subcall function 00ED3A46: LoadIconW.USER32(000000A2), ref: 00ED3A9A
                                                          • Part of subcall function 00ED3A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00ED3AC0
                                                          • Part of subcall function 00ED3A46: RegisterClassExW.USER32(?), ref: 00ED3B16
                                                          • Part of subcall function 00ED39D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00ED3A03
                                                          • Part of subcall function 00ED39D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00ED3A24
                                                          • Part of subcall function 00ED39D5: ShowWindow.USER32(00000000,?,?), ref: 00ED3A38
                                                          • Part of subcall function 00ED39D5: ShowWindow.USER32(00000000,?,?), ref: 00ED3A41
                                                          • Part of subcall function 00ED434A: _memset.LIBCMT ref: 00ED4370
                                                          • Part of subcall function 00ED434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00ED4415
                                                        Strings
                                                        • runas, xrefs: 00F0D33A
                                                        • This is a third-party compiled AutoIt script., xrefs: 00F0D279
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                                                        • String ID: This is a third-party compiled AutoIt script.$runas
                                                        • API String ID: 529118366-3287110873
                                                        • Opcode ID: 80be15f2fbd3888349bc61a9868ca5c48a2ecead757955ddc39d1a071c98032b
                                                        • Instruction ID: 2b5758d55811e46b5416571133f75483a7cf871cac6aa687bfb6b5499229e39d
                                                        • Opcode Fuzzy Hash: 80be15f2fbd3888349bc61a9868ca5c48a2ecead757955ddc39d1a071c98032b
                                                        • Instruction Fuzzy Hash: 46510870D0824CAEDF12EBB4DC05EEDBBB4EB45750F005067F551B22A2DA709606FB22

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 996 ed49a0-ed4a00 call ed7667 GetVersionExW call ed7bcc 1001 ed4b0b-ed4b0d 996->1001 1002 ed4a06 996->1002 1003 f0d767-f0d773 1001->1003 1004 ed4a09-ed4a0e 1002->1004 1005 f0d774-f0d778 1003->1005 1006 ed4a14 1004->1006 1007 ed4b12-ed4b13 1004->1007 1009 f0d77a 1005->1009 1010 f0d77b-f0d787 1005->1010 1008 ed4a15-ed4a4c call ed7d2c call ed7726 1006->1008 1007->1008 1018 f0d864-f0d867 1008->1018 1019 ed4a52-ed4a53 1008->1019 1009->1010 1010->1005 1012 f0d789-f0d78e 1010->1012 1012->1004 1014 f0d794-f0d79b 1012->1014 1014->1003 1016 f0d79d 1014->1016 1020 f0d7a2-f0d7a5 1016->1020 1021 f0d880-f0d884 1018->1021 1022 f0d869 1018->1022 1019->1020 1023 ed4a59-ed4a64 1019->1023 1024 f0d7ab-f0d7c9 1020->1024 1025 ed4a93-ed4aaa GetCurrentProcess IsWow64Process 1020->1025 1030 f0d886-f0d88f 1021->1030 1031 f0d86f-f0d878 1021->1031 1026 f0d86c 1022->1026 1027 ed4a6a-ed4a6c 1023->1027 1028 f0d7ea-f0d7f0 1023->1028 1024->1025 1029 f0d7cf-f0d7d5 1024->1029 1032 ed4aac 1025->1032 1033 ed4aaf-ed4ac0 1025->1033 1026->1031 1034 f0d805-f0d811 1027->1034 1035 ed4a72-ed4a75 1027->1035 1038 f0d7f2-f0d7f5 1028->1038 1039 f0d7fa-f0d800 1028->1039 1036 f0d7d7-f0d7da 1029->1036 1037 f0d7df-f0d7e5 1029->1037 1030->1026 1040 f0d891-f0d894 1030->1040 1031->1021 1032->1033 1041 ed4b2b-ed4b35 GetSystemInfo 1033->1041 1042 ed4ac2-ed4ad2 call ed4b37 1033->1042 1046 f0d813-f0d816 1034->1046 1047 f0d81b-f0d821 1034->1047 1043 f0d831-f0d834 1035->1043 1044 ed4a7b-ed4a8a 1035->1044 1036->1025 1037->1025 1038->1025 1039->1025 1040->1031 1045 ed4af8-ed4b08 1041->1045 1053 ed4b1f-ed4b29 GetSystemInfo 1042->1053 1054 ed4ad4-ed4ae1 call ed4b37 1042->1054 1043->1025 1052 f0d83a-f0d84f 1043->1052 1049 f0d826-f0d82c 1044->1049 1050 ed4a90 1044->1050 1046->1025 1047->1025 1049->1025 1050->1025 1055 f0d851-f0d854 1052->1055 1056 f0d859-f0d85f 1052->1056 1057 ed4ae9-ed4aed 1053->1057 1061 ed4b18-ed4b1d 1054->1061 1062 ed4ae3-ed4ae7 GetNativeSystemInfo 1054->1062 1055->1025 1056->1025 1057->1045 1059 ed4aef-ed4af2 FreeLibrary 1057->1059 1059->1045 1061->1062 1062->1057
                                                        APIs
                                                        • GetVersionExW.KERNEL32(?), ref: 00ED49CD
                                                          • Part of subcall function 00ED7BCC: _memmove.LIBCMT ref: 00ED7C06
                                                        • GetCurrentProcess.KERNEL32(?,00F5FAEC,00000000,00000000,?), ref: 00ED4A9A
                                                        • IsWow64Process.KERNEL32(00000000), ref: 00ED4AA1
                                                        • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00ED4AE7
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00ED4AF2
                                                        • GetSystemInfo.KERNEL32(00000000), ref: 00ED4B23
                                                        • GetSystemInfo.KERNEL32(00000000), ref: 00ED4B2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                                                        • String ID:
                                                        • API String ID: 1986165174-0
                                                        • Opcode ID: 6ef1fdffbd5118812aa9c90c3f9971e2ff3d3e863a3f13b607a1701a3e8e311d
                                                        • Instruction ID: ecc98092b43bb02f533ce0403c167a3addf03800b99bc013aa9e9e77cc26d930
                                                        • Opcode Fuzzy Hash: 6ef1fdffbd5118812aa9c90c3f9971e2ff3d3e863a3f13b607a1701a3e8e311d
                                                        • Instruction Fuzzy Hash: 1A91C3719897C4DFC731DB6885501AABFF5AF3A300B4859AFD0C7A3B81E230A509E759

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1063 ed4e89-ed4ea1 CreateStreamOnHGlobal 1064 ed4ec1-ed4ec6 1063->1064 1065 ed4ea3-ed4eba FindResourceExW 1063->1065 1066 f0d933-f0d942 LoadResource 1065->1066 1067 ed4ec0 1065->1067 1066->1067 1068 f0d948-f0d956 SizeofResource 1066->1068 1067->1064 1068->1067 1069 f0d95c-f0d967 LockResource 1068->1069 1069->1067 1070 f0d96d-f0d98b 1069->1070 1070->1067
                                                        APIs
                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00ED4D8E,?,?,00000000,00000000), ref: 00ED4E99
                                                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00ED4D8E,?,?,00000000,00000000), ref: 00ED4EB0
                                                        • LoadResource.KERNEL32(?,00000000,?,?,00ED4D8E,?,?,00000000,00000000,?,?,?,?,?,?,00ED4E2F), ref: 00F0D937
                                                        • SizeofResource.KERNEL32(?,00000000,?,?,00ED4D8E,?,?,00000000,00000000,?,?,?,?,?,?,00ED4E2F), ref: 00F0D94C
                                                        • LockResource.KERNEL32(00ED4D8E,?,?,00ED4D8E,?,?,00000000,00000000,?,?,?,?,?,?,00ED4E2F,00000000), ref: 00F0D95F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                        • String ID: SCRIPT
                                                        • API String ID: 3051347437-3967369404
                                                        • Opcode ID: bf246876096f3a595cb635bc322313061b6569d81261b17f8ae7d36a6a7bea91
                                                        • Instruction ID: 568ee854ab60a10dc987e4c06a6dab963d8f0cc152c17f925db2558d9163754d
                                                        • Opcode Fuzzy Hash: bf246876096f3a595cb635bc322313061b6569d81261b17f8ae7d36a6a7bea91
                                                        • Instruction Fuzzy Hash: 7911A0B4200704BFD7208B65EC48F677BBAFBC5B12F2042ADF905DA290DB72EC059661
                                                        APIs
                                                        • GetFileAttributesW.KERNELBASE(?,00F0E398), ref: 00F3446A
                                                        • FindFirstFileW.KERNELBASE(?,?), ref: 00F3447B
                                                        • FindClose.KERNEL32(00000000), ref: 00F3448B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: FileFind$AttributesCloseFirst
                                                        • String ID:
                                                        • API String ID: 48322524-0
                                                        • Opcode ID: 3cf411d1edd4194d962647e4af14c6aacefb3077df62339913a64ddef706e4d8
                                                        • Instruction ID: 659d93d385d72bb2a59e247afa32e2f972ce8e4d2dac07d57616a8ad631609c6
                                                        • Opcode Fuzzy Hash: 3cf411d1edd4194d962647e4af14c6aacefb3077df62339913a64ddef706e4d8
                                                        • Instruction Fuzzy Hash: 74E0D873810604A75210AB38EC0D4E97B5C9F05336F100765FE35C20E0E7747904B696
                                                        APIs
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EE0A5B
                                                        • timeGetTime.WINMM ref: 00EE0D16
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EE0E53
                                                        • Sleep.KERNEL32(0000000A), ref: 00EE0E61
                                                        • LockWindowUpdate.USER32(00000000,?,?), ref: 00EE0EFA
                                                        • DestroyWindow.USER32 ref: 00EE0F06
                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00EE0F20
                                                        • Sleep.KERNEL32(0000000A,?,?), ref: 00F14E83
                                                        • TranslateMessage.USER32(?), ref: 00F15C60
                                                        • DispatchMessageW.USER32(?), ref: 00F15C6E
                                                        • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00F15C82
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                                                        • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                        • API String ID: 4212290369-3242690629
                                                        • Opcode ID: 995cbf1e31119003f0568009e81ff54c821a3545a78e93af35e85e019fb2d96a
                                                        • Instruction ID: c8d579e25d5ea360e30eafef08f32f7c35b8b9662d2797098e92dfd9b48b5dfa
                                                        • Opcode Fuzzy Hash: 995cbf1e31119003f0568009e81ff54c821a3545a78e93af35e85e019fb2d96a
                                                        • Instruction Fuzzy Hash: 2FB21470608785DFDB24DF24C884BAAB7E0FF84714F14491EE599A72A1C770E8C5EB82

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 00F38F5F: __time64.LIBCMT ref: 00F38F69
                                                          • Part of subcall function 00ED4EE5: _fseek.LIBCMT ref: 00ED4EFD
                                                        • __wsplitpath.LIBCMT ref: 00F39234
                                                          • Part of subcall function 00EF40FB: __wsplitpath_helper.LIBCMT ref: 00EF413B
                                                        • _wcscpy.LIBCMT ref: 00F39247
                                                        • _wcscat.LIBCMT ref: 00F3925A
                                                        • __wsplitpath.LIBCMT ref: 00F3927F
                                                        • _wcscat.LIBCMT ref: 00F39295
                                                        • _wcscat.LIBCMT ref: 00F392A8
                                                          • Part of subcall function 00F38FA5: _memmove.LIBCMT ref: 00F38FDE
                                                          • Part of subcall function 00F38FA5: _memmove.LIBCMT ref: 00F38FED
                                                        • _wcscmp.LIBCMT ref: 00F391EF
                                                          • Part of subcall function 00F39734: _wcscmp.LIBCMT ref: 00F39824
                                                          • Part of subcall function 00F39734: _wcscmp.LIBCMT ref: 00F39837
                                                        • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00F39452
                                                        • _wcsncpy.LIBCMT ref: 00F394C5
                                                        • DeleteFileW.KERNEL32(?,?), ref: 00F394FB
                                                        • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00F39511
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F39522
                                                        • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F39534
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                                                        • String ID:
                                                        • API String ID: 1500180987-0
                                                        • Opcode ID: 351723bb52757ed866eac33b266d3d274d80a5a93194ff648f79321a414e30a5
                                                        • Instruction ID: 69c4382914032e12bc90243c346b0ed38482d19182018b7e15f5a603257387ac
                                                        • Opcode Fuzzy Hash: 351723bb52757ed866eac33b266d3d274d80a5a93194ff648f79321a414e30a5
                                                        • Instruction Fuzzy Hash: 67C14CB1D04219ABDF21DFA4CC85EEEB7BCEF55310F0040AAF609E6251DB709A859F61

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00ED3074
                                                        • RegisterClassExW.USER32(00000030), ref: 00ED309E
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00ED30AF
                                                        • InitCommonControlsEx.COMCTL32(?), ref: 00ED30CC
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00ED30DC
                                                        • LoadIconW.USER32(000000A9), ref: 00ED30F2
                                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00ED3101
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: b13e2c32276727bfc8df1c167add6f1a7a4a116b1dbb7092aa481fdf5849e569
                                                        • Instruction ID: 874631ccd3d3a92ae96bba3e954f42b074b2613a4e182c41dfba61e5eb628cb3
                                                        • Opcode Fuzzy Hash: b13e2c32276727bfc8df1c167add6f1a7a4a116b1dbb7092aa481fdf5849e569
                                                        • Instruction Fuzzy Hash: 35314771841309AFDB01CFA4EC89ADEBBF0FB09711F1445AEE680E62A0D3B50589DF91

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00ED3074
                                                        • RegisterClassExW.USER32(00000030), ref: 00ED309E
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00ED30AF
                                                        • InitCommonControlsEx.COMCTL32(?), ref: 00ED30CC
                                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00ED30DC
                                                        • LoadIconW.USER32(000000A9), ref: 00ED30F2
                                                        • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00ED3101
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 2914291525-1005189915
                                                        • Opcode ID: 052662d08b965b4f86ca901b5a2d2f552f20eb04a5b1af9b9079abd6279851dc
                                                        • Instruction ID: cb0ecf1d0d29063ce2f8bec0bce4c6a246780af13dce9d46727e3f7680956971
                                                        • Opcode Fuzzy Hash: 052662d08b965b4f86ca901b5a2d2f552f20eb04a5b1af9b9079abd6279851dc
                                                        • Instruction Fuzzy Hash: 0621B4B191171CAFDB01DFA4E849ADDBBF4FB08B11F04416AFA11A62A0D7B14548AF91

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 00ED4706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00F952F8,?,00ED37AE,?), ref: 00ED4724
                                                          • Part of subcall function 00EF050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00ED7165), ref: 00EF052D
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00ED71A8
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00F0E8C8
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00F0E909
                                                        • RegCloseKey.ADVAPI32(?), ref: 00F0E947
                                                        • _wcscat.LIBCMT ref: 00F0E9A0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                                                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                        • API String ID: 2673923337-2727554177
                                                        • Opcode ID: 44e2a78b37aba01812f0efc7c84779b529ba7ff01b49bdd003ac8c549e59f789
                                                        • Instruction ID: 2bf7aad51b00c15ad5053780fe87ae25728bbc80399de0625e25cbd7988f536f
                                                        • Opcode Fuzzy Hash: 44e2a78b37aba01812f0efc7c84779b529ba7ff01b49bdd003ac8c549e59f789
                                                        • Instruction Fuzzy Hash: FB718D725083059ECB00EF25EC419ABBBE8FF89350F40192FF585D72A1EB719949EB52

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00ED3A50
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00ED3A5F
                                                        • LoadIconW.USER32(00000063), ref: 00ED3A76
                                                        • LoadIconW.USER32(000000A4), ref: 00ED3A88
                                                        • LoadIconW.USER32(000000A2), ref: 00ED3A9A
                                                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00ED3AC0
                                                        • RegisterClassExW.USER32(?), ref: 00ED3B16
                                                          • Part of subcall function 00ED3041: GetSysColorBrush.USER32(0000000F), ref: 00ED3074
                                                          • Part of subcall function 00ED3041: RegisterClassExW.USER32(00000030), ref: 00ED309E
                                                          • Part of subcall function 00ED3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00ED30AF
                                                          • Part of subcall function 00ED3041: InitCommonControlsEx.COMCTL32(?), ref: 00ED30CC
                                                          • Part of subcall function 00ED3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00ED30DC
                                                          • Part of subcall function 00ED3041: LoadIconW.USER32(000000A9), ref: 00ED30F2
                                                          • Part of subcall function 00ED3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00ED3101
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                        • String ID: #$0$AutoIt v3
                                                        • API String ID: 423443420-4155596026
                                                        • Opcode ID: f3f72b16d16bd157899ecc90bfbfb6253ef1667997993e196449754af5e692ba
                                                        • Instruction ID: 06be64372311c4ddf6d0936de577fa4c1e6fc1c5f76f75d121263ee63dcc7035
                                                        • Opcode Fuzzy Hash: f3f72b16d16bd157899ecc90bfbfb6253ef1667997993e196449754af5e692ba
                                                        • Instruction Fuzzy Hash: 6F2128B1D0070CAFEB12DFA4EC49B9D7BB4FB08B11F1001ABF604A62A1D3B55654AF94

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 767 ed3633-ed3681 769 ed36e1-ed36e3 767->769 770 ed3683-ed3686 767->770 769->770 771 ed36e5 769->771 772 ed3688-ed368f 770->772 773 ed36e7 770->773 774 ed36ca-ed36d2 DefWindowProcW 771->774 777 ed374b-ed3753 PostQuitMessage 772->777 778 ed3695-ed369a 772->778 775 ed36ed-ed36f0 773->775 776 f0d0cc-f0d0fa call ee1070 call ee1093 773->776 779 ed36d8-ed36de 774->779 780 ed3715-ed373c SetTimer RegisterWindowMessageW 775->780 781 ed36f2-ed36f3 775->781 814 f0d0ff-f0d106 776->814 785 ed3711-ed3713 777->785 783 f0d154-f0d168 call f32527 778->783 784 ed36a0-ed36a2 778->784 780->785 789 ed373e-ed3749 CreatePopupMenu 780->789 786 ed36f9-ed370c KillTimer call ed443a call ed3114 781->786 787 f0d06f-f0d072 781->787 783->785 809 f0d16e 783->809 790 ed36a8-ed36ad 784->790 791 ed3755-ed3764 call ed44a0 784->791 785->779 786->785 793 f0d074-f0d076 787->793 794 f0d0a8-f0d0c7 MoveWindow 787->794 789->785 797 f0d139-f0d140 790->797 798 ed36b3-ed36b8 790->798 791->785 802 f0d097-f0d0a3 SetFocus 793->802 803 f0d078-f0d07b 793->803 794->785 797->774 805 f0d146-f0d14f call f27c36 797->805 807 ed36be-ed36c4 798->807 808 f0d124-f0d134 call f32d36 798->808 802->785 803->807 810 f0d081-f0d092 call ee1070 803->810 805->774 807->774 807->814 808->785 809->774 810->785 814->774 815 f0d10c-f0d11f call ed443a call ed434a 814->815 815->774
                                                        APIs
                                                        • DefWindowProcW.USER32(?,?,?,?), ref: 00ED36D2
                                                        • KillTimer.USER32(?,00000001), ref: 00ED36FC
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00ED371F
                                                        • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00ED372A
                                                        • CreatePopupMenu.USER32 ref: 00ED373E
                                                        • PostQuitMessage.USER32(00000000), ref: 00ED374D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                        • String ID: TaskbarCreated
                                                        • API String ID: 129472671-2362178303
                                                        • Opcode ID: 95a1718429287f1f6236177c1d03b0ab700d449902e99b7b028366d151c9c559
                                                        • Instruction ID: e126c13b066a10d7e8a37cebad7fda85f9da9a3593cdd7102f549b1ed04b59da
                                                        • Opcode Fuzzy Hash: 95a1718429287f1f6236177c1d03b0ab700d449902e99b7b028366d151c9c559
                                                        • Instruction Fuzzy Hash: 02412BB1500A09BBDF15AF74EC09BBA3B94EB04701F102127F601B63E2CA719E46B763

                                                        Control-flow Graph

                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                                                        • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                                                        • API String ID: 1825951767-3513169116
                                                        • Opcode ID: 794c381c9860cd6c488910baab6cca8639471ca25ad0518b5d833c89e07274c5
                                                        • Instruction ID: adc706b2f275c6cc8103ef57912234199ff32ebb176e982b7bdc03f83a39e8d6
                                                        • Opcode Fuzzy Hash: 794c381c9860cd6c488910baab6cca8639471ca25ad0518b5d833c89e07274c5
                                                        • Instruction Fuzzy Hash: 2BA17F7191021D9ADF05EBA4DC51AEEB7B9FF14310F00242BF815B7292EF749A0ADB61

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 942 17eb930-17eb9de call 17e9320 945 17eb9e5-17eba0b call 17ec840 CreateFileW 942->945 948 17eba0d 945->948 949 17eba12-17eba22 945->949 950 17ebb5d-17ebb61 948->950 954 17eba29-17eba43 VirtualAlloc 949->954 955 17eba24 949->955 952 17ebba3-17ebba6 950->952 953 17ebb63-17ebb67 950->953 956 17ebba9-17ebbb0 952->956 957 17ebb69-17ebb6c 953->957 958 17ebb73-17ebb77 953->958 961 17eba4a-17eba61 ReadFile 954->961 962 17eba45 954->962 955->950 963 17ebc05-17ebc1a 956->963 964 17ebbb2-17ebbbd 956->964 957->958 959 17ebb79-17ebb83 958->959 960 17ebb87-17ebb8b 958->960 959->960 967 17ebb8d-17ebb97 960->967 968 17ebb9b 960->968 969 17eba68-17ebaa8 VirtualAlloc 961->969 970 17eba63 961->970 962->950 965 17ebc1c-17ebc27 VirtualFree 963->965 966 17ebc2a-17ebc32 963->966 971 17ebbbf 964->971 972 17ebbc1-17ebbcd 964->972 965->966 967->968 968->952 973 17ebaaf-17ebaca call 17eca90 969->973 974 17ebaaa 969->974 970->950 971->963 975 17ebbcf-17ebbdf 972->975 976 17ebbe1-17ebbed 972->976 982 17ebad5-17ebadf 973->982 974->950 980 17ebc03 975->980 977 17ebbef-17ebbf8 976->977 978 17ebbfa-17ebc00 976->978 977->980 978->980 980->956 983 17ebb12-17ebb26 call 17ec8a0 982->983 984 17ebae1-17ebb10 call 17eca90 982->984 990 17ebb2a-17ebb2e 983->990 991 17ebb28 983->991 984->982 992 17ebb3a-17ebb3e 990->992 993 17ebb30-17ebb34 CloseHandle 990->993 991->950 994 17ebb4e-17ebb57 992->994 995 17ebb40-17ebb4b VirtualFree 992->995 993->992 994->945 994->950 995->994
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 017EBA01
                                                        • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 017EBC27
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1711926957.00000000017E9000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E9000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17e9000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CreateFileFreeVirtual
                                                        • String ID:
                                                        • API String ID: 204039940-0
                                                        • Opcode ID: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                        • Instruction ID: 0b7eb5b84b1b4fee76f7e832833fa426dff15e37bf4f1a5db677b52f1a6fecce
                                                        • Opcode Fuzzy Hash: e3e00bf9dbafeb2e33b0b1731302cb2fbf5584eb46f22b1b855d3d8c7a9348fe
                                                        • Instruction Fuzzy Hash: E7A1F874E00209EBDF14CFA4C998BAEFBF5BF48305F208599E211BB284D7759A41CB95

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1073 ed39d5-ed3a45 CreateWindowExW * 2 ShowWindow * 2
                                                        APIs
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00ED3A03
                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00ED3A24
                                                        • ShowWindow.USER32(00000000,?,?), ref: 00ED3A38
                                                        • ShowWindow.USER32(00000000,?,?), ref: 00ED3A41
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateShow
                                                        • String ID: AutoIt v3$edit
                                                        • API String ID: 1584632944-3779509399
                                                        • Opcode ID: 3778d1151b6a14f16cce2d10f32c6eac27acfe5f1d4850530d04f9ead6a93d7d
                                                        • Instruction ID: f10f2b8264f7680ee7bd35e6f5cdc1ce4a258b8d25fde9532590f9552b4e6554
                                                        • Opcode Fuzzy Hash: 3778d1151b6a14f16cce2d10f32c6eac27acfe5f1d4850530d04f9ead6a93d7d
                                                        • Instruction Fuzzy Hash: 5CF03A705006987EEB3257636C08E2B3E7DD7CBF51B00006ABA00A21B0C2611805EBB0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1074 17eb6d0-17eb826 call 17e9320 call 17eb5c0 CreateFileW 1081 17eb82d-17eb83d 1074->1081 1082 17eb828 1074->1082 1085 17eb83f 1081->1085 1086 17eb844-17eb85e VirtualAlloc 1081->1086 1083 17eb8dd-17eb8e2 1082->1083 1085->1083 1087 17eb862-17eb879 ReadFile 1086->1087 1088 17eb860 1086->1088 1089 17eb87d-17eb8b7 call 17eb600 call 17ea5c0 1087->1089 1090 17eb87b 1087->1090 1088->1083 1095 17eb8b9-17eb8ce call 17eb650 1089->1095 1096 17eb8d3-17eb8db ExitProcess 1089->1096 1090->1083 1095->1096 1096->1083
                                                        APIs
                                                          • Part of subcall function 017EB5C0: Sleep.KERNELBASE(000001F4), ref: 017EB5D1
                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 017EB81C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1711926957.00000000017E9000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E9000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17e9000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CreateFileSleep
                                                        • String ID: 6B8Q9RDI0JTQI2WXXIAS
                                                        • API String ID: 2694422964-103329262
                                                        • Opcode ID: d744fedd13d87b78a5bcd4802c91be0219913a17528fb69cc9c4716d6b741dfa
                                                        • Instruction ID: 3996034df019db0f14791b029c8b4696600aba9246cad417fee2451a588bebb9
                                                        • Opcode Fuzzy Hash: d744fedd13d87b78a5bcd4802c91be0219913a17528fb69cc9c4716d6b741dfa
                                                        • Instruction Fuzzy Hash: F5517270D14248DBEF11DBE4C858BEEBBB9AF18304F104199E608BB2C1D7B95B45CBA5

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1098 ed407c-ed4092 1099 ed416f-ed4173 1098->1099 1100 ed4098-ed40ad call ed7a16 1098->1100 1103 f0d3c8-f0d3d7 LoadStringW 1100->1103 1104 ed40b3-ed40d3 call ed7bcc 1100->1104 1107 f0d3e2-f0d3fa call ed7b2e call ed6fe3 1103->1107 1104->1107 1108 ed40d9-ed40dd 1104->1108 1117 ed40ed-ed416a call ef2de0 call ed454e call ef2dbc Shell_NotifyIconW call ed5904 1107->1117 1120 f0d400-f0d41e call ed7cab call ed6fe3 call ed7cab 1107->1120 1110 ed4174-ed417d call ed8047 1108->1110 1111 ed40e3-ed40e8 call ed7b2e 1108->1111 1110->1117 1111->1117 1117->1099 1120->1117
                                                        APIs
                                                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00F0D3D7
                                                          • Part of subcall function 00ED7BCC: _memmove.LIBCMT ref: 00ED7C06
                                                        • _memset.LIBCMT ref: 00ED40FC
                                                        • _wcscpy.LIBCMT ref: 00ED4150
                                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00ED4160
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                                                        • String ID: Line:
                                                        • API String ID: 3942752672-1585850449
                                                        • Opcode ID: 32f47cedb0793aff59c35e9f0f1f916a4e2bb0975a1c809decb7472886951a73
                                                        • Instruction ID: 295e46c5b24e8872f64a8d7c3de87ef351d8de2cb2dc10386ed3bdedc519277b
                                                        • Opcode Fuzzy Hash: 32f47cedb0793aff59c35e9f0f1f916a4e2bb0975a1c809decb7472886951a73
                                                        • Instruction Fuzzy Hash: A631ED71008708AFD321EB60DC46BEB77D8EB54300F10151FF284A22E2EB70A64ADB83

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1133 ef541d-ef5436 1134 ef5438-ef543d 1133->1134 1135 ef5453 1133->1135 1134->1135 1136 ef543f-ef5441 1134->1136 1137 ef5455-ef545b 1135->1137 1138 ef545c-ef5461 1136->1138 1139 ef5443-ef5448 call ef8b28 1136->1139 1141 ef546f-ef5473 1138->1141 1142 ef5463-ef546d 1138->1142 1149 ef544e call ef8db6 1139->1149 1145 ef5475-ef5480 call ef2de0 1141->1145 1146 ef5483-ef5485 1141->1146 1142->1141 1144 ef5493-ef54a2 1142->1144 1147 ef54a9 1144->1147 1148 ef54a4-ef54a7 1144->1148 1145->1146 1146->1139 1151 ef5487-ef5491 1146->1151 1152 ef54ae-ef54b3 1147->1152 1148->1152 1149->1135 1151->1139 1151->1144 1155 ef559c-ef559f 1152->1155 1156 ef54b9-ef54c0 1152->1156 1155->1137 1157 ef54c2-ef54ca 1156->1157 1158 ef5501-ef5503 1156->1158 1157->1158 1159 ef54cc 1157->1159 1160 ef556d-ef556e call f00ba7 1158->1160 1161 ef5505-ef5507 1158->1161 1162 ef55ca 1159->1162 1163 ef54d2-ef54d4 1159->1163 1167 ef5573-ef5577 1160->1167 1165 ef552b-ef5536 1161->1165 1166 ef5509-ef5511 1161->1166 1174 ef55ce-ef55d7 1162->1174 1172 ef54db-ef54e0 1163->1172 1173 ef54d6-ef54d8 1163->1173 1170 ef553a-ef553d 1165->1170 1171 ef5538 1165->1171 1168 ef5513-ef551f 1166->1168 1169 ef5521-ef5525 1166->1169 1167->1174 1175 ef5579-ef557e 1167->1175 1176 ef5527-ef5529 1168->1176 1169->1176 1177 ef553f-ef554b call ef46e6 call f00e5b 1170->1177 1178 ef55a4-ef55a8 1170->1178 1171->1170 1172->1178 1179 ef54e6-ef54ff call f00cc8 1172->1179 1173->1172 1174->1137 1175->1178 1180 ef5580-ef5591 1175->1180 1176->1170 1194 ef5550-ef5555 1177->1194 1181 ef55ba-ef55c5 call ef8b28 1178->1181 1182 ef55aa-ef55b7 call ef2de0 1178->1182 1193 ef5562-ef556b 1179->1193 1185 ef5594-ef5596 1180->1185 1181->1149 1182->1181 1185->1155 1185->1156 1193->1185 1195 ef55dc-ef55e0 1194->1195 1196 ef555b-ef555e 1194->1196 1195->1174 1196->1162 1197 ef5560 1196->1197 1197->1193
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                                                        • String ID:
                                                        • API String ID: 1559183368-0
                                                        • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                        • Instruction ID: bc777cb815d198b260199374b3e51be1e91865961acf5988622adb87a6702322
                                                        • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                                                        • Instruction Fuzzy Hash: E451D972A00B0DDBCB248FA9DC406BE77A2AF61325F249729FB35B62D0D7709D509B40
                                                        APIs
                                                          • Part of subcall function 00ED4DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00F952F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00ED4E0F
                                                        • _free.LIBCMT ref: 00F0E263
                                                        • _free.LIBCMT ref: 00F0E2AA
                                                          • Part of subcall function 00ED6A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00ED6BAD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _free$CurrentDirectoryLibraryLoad
                                                        • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                        • API String ID: 2861923089-1757145024
                                                        • Opcode ID: 98d57ec5f45b1b7d3f91054875750d4489a2c871445d201c950ebe7071ea267a
                                                        • Instruction ID: 346dcb266c6940fac749946203bbe38ce550e5e67ea67b23abd0188fd65d7fc4
                                                        • Opcode Fuzzy Hash: 98d57ec5f45b1b7d3f91054875750d4489a2c871445d201c950ebe7071ea267a
                                                        • Instruction Fuzzy Hash: C8916D71D04219AFCF14EFA4CC819EDB7B8FF14310B10486AF815BB2A1DB74A906EB50
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00ED35A1,SwapMouseButtons,00000004,?), ref: 00ED35D4
                                                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00ED35A1,SwapMouseButtons,00000004,?,?,?,?,00ED2754), ref: 00ED35F5
                                                        • RegCloseKey.KERNELBASE(00000000,?,?,00ED35A1,SwapMouseButtons,00000004,?,?,?,?,00ED2754), ref: 00ED3617
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CloseOpenQueryValue
                                                        • String ID: Control Panel\Mouse
                                                        • API String ID: 3677997916-824357125
                                                        • Opcode ID: d0cc4b8f7c03efaf093b15a4f048d2eda5bbd1a2aa6d8434e75010384cef9c07
                                                        • Instruction ID: 544e81d99fe056564ea4e4d4c0f456ec8bdffaf20db245db9c580cb7ec479b4e
                                                        • Opcode Fuzzy Hash: d0cc4b8f7c03efaf093b15a4f048d2eda5bbd1a2aa6d8434e75010384cef9c07
                                                        • Instruction Fuzzy Hash: 28113675910208BADB20CF64DC40EAABBA8EF04744F0054AAA905E7250D2719E46A761
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 017EADED
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 017EAE11
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 017EAE33
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1711926957.00000000017E9000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E9000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17e9000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: 9a8a17a12fb03160a4a55839945f9e7e1859a6c72d72ca89e8ed8c326fc6e5c7
                                                        • Instruction ID: f26e45c41e673cc493fceb7b1b190149be5dbdd6c19b87373907681b97b44f57
                                                        • Opcode Fuzzy Hash: 9a8a17a12fb03160a4a55839945f9e7e1859a6c72d72ca89e8ed8c326fc6e5c7
                                                        • Instruction Fuzzy Hash: 06620D30A14258DBEB24CFA4C854BDEB7B6EF58300F1091A9D10DEB394E7769E81CB59
                                                        APIs
                                                          • Part of subcall function 00ED4EE5: _fseek.LIBCMT ref: 00ED4EFD
                                                          • Part of subcall function 00F39734: _wcscmp.LIBCMT ref: 00F39824
                                                          • Part of subcall function 00F39734: _wcscmp.LIBCMT ref: 00F39837
                                                        • _free.LIBCMT ref: 00F396A2
                                                        • _free.LIBCMT ref: 00F396A9
                                                        • _free.LIBCMT ref: 00F39714
                                                          • Part of subcall function 00EF2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00EF9A24), ref: 00EF2D69
                                                          • Part of subcall function 00EF2D55: GetLastError.KERNEL32(00000000,?,00EF9A24), ref: 00EF2D7B
                                                        • _free.LIBCMT ref: 00F3971C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                        • String ID:
                                                        • API String ID: 1552873950-0
                                                        • Opcode ID: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                        • Instruction ID: 84514a6350e170be3073c7e2b470f046256e9fac3bd5fb3e6f6c9d47dcc61d47
                                                        • Opcode Fuzzy Hash: 83a1bf45cb5b46f0fbbb2b282febcfcf75e63ad05b5baa694a85d9b23f0f737c
                                                        • Instruction Fuzzy Hash: CB514EB1D04218ABDF259F64CC81AAEBBB9EF48310F10049EF609A7391DB715A81CF58
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                                                        • String ID:
                                                        • API String ID: 2782032738-0
                                                        • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                        • Instruction ID: a399547b3d98ef312eb3382aaa059331d2b4bc6b20e906d6f20c44f945e9e450
                                                        • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                                                        • Instruction Fuzzy Hash: 2A41C5B5B0078D9BDB1C9E69C8809BB7BA5EF413A4B14917EF619A76C0D770DD408B40
                                                        APIs
                                                        • _memset.LIBCMT ref: 00F0EA39
                                                        • GetOpenFileNameW.COMDLG32(?), ref: 00F0EA83
                                                          • Part of subcall function 00ED4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00ED4743,?,?,00ED37AE,?), ref: 00ED4770
                                                          • Part of subcall function 00EF0791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00EF07B0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Name$Path$FileFullLongOpen_memset
                                                        • String ID: X
                                                        • API String ID: 3777226403-3081909835
                                                        • Opcode ID: 4ef4b5105806c74500136919f1e071373a8fa131d3acfbc0a579c541c0990b47
                                                        • Instruction ID: 6f1d31f1e65934a142adefd935e3411bc5b1dd4ac2cd91d22be16e67cb3141bb
                                                        • Opcode Fuzzy Hash: 4ef4b5105806c74500136919f1e071373a8fa131d3acfbc0a579c541c0990b47
                                                        • Instruction Fuzzy Hash: 2221C670A002489BCB119F94CC45BEE7BF9AF48710F00405AE548B7382DBB4594A9F91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock_memmove
                                                        • String ID: EA06
                                                        • API String ID: 1988441806-3962188686
                                                        • Opcode ID: e935a250548ede965de484b58d1bc1c6037aa25bfe5202cecbf576dfa681bdd1
                                                        • Instruction ID: f694df873f1759e8c5e4e7fc3450f3e5ee720d4274b4aae713d622b10da5cc8b
                                                        • Opcode Fuzzy Hash: e935a250548ede965de484b58d1bc1c6037aa25bfe5202cecbf576dfa681bdd1
                                                        • Instruction Fuzzy Hash: 0A01B972D042187EDF18DAA8CC56EFE7BF8DB15311F00459AF652D2181E979E6049760
                                                        APIs
                                                        • GetTempPathW.KERNEL32(00000104,?), ref: 00F398F8
                                                        • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00F3990F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Temp$FileNamePath
                                                        • String ID: aut
                                                        • API String ID: 3285503233-3010740371
                                                        • Opcode ID: e3fda4ce9cc9c718ec1a7eb92819fe8e2fe9c9b2ceaa497ba05e93d3a5915714
                                                        • Instruction ID: 3bcb7057e8d1523c06517883477d2cc5e44e2f0ba05f4d9f730d768eb727253b
                                                        • Opcode Fuzzy Hash: e3fda4ce9cc9c718ec1a7eb92819fe8e2fe9c9b2ceaa497ba05e93d3a5915714
                                                        • Instruction Fuzzy Hash: B5D05EB958030DABDB50ABA0DC0EFDA773CE704701F4002F1BB54960A1EAB095999B92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2a8a936551cc7c7c401ffcc7a0e416858085783c672dc4330bf93edeb222d3b2
                                                        • Instruction ID: d8e46cb842382c23ddc3347daac6b513f364cfa2269a393c763b207c5052906c
                                                        • Opcode Fuzzy Hash: 2a8a936551cc7c7c401ffcc7a0e416858085783c672dc4330bf93edeb222d3b2
                                                        • Instruction Fuzzy Hash: 0CF16E71A083009FC754DF28C880A6ABBE5FF88324F14992EF8999B351D735E945DF92
                                                        APIs
                                                          • Part of subcall function 00EF0162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00EF0193
                                                          • Part of subcall function 00EF0162: MapVirtualKeyW.USER32(00000010,00000000), ref: 00EF019B
                                                          • Part of subcall function 00EF0162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00EF01A6
                                                          • Part of subcall function 00EF0162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00EF01B1
                                                          • Part of subcall function 00EF0162: MapVirtualKeyW.USER32(00000011,00000000), ref: 00EF01B9
                                                          • Part of subcall function 00EF0162: MapVirtualKeyW.USER32(00000012,00000000), ref: 00EF01C1
                                                          • Part of subcall function 00EE60F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00EDF930), ref: 00EE6154
                                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00EDF9CD
                                                        • OleInitialize.OLE32(00000000), ref: 00EDFA4A
                                                        • CloseHandle.KERNEL32(00000000), ref: 00F145C8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                        • String ID:
                                                        • API String ID: 1986988660-0
                                                        • Opcode ID: 3359e37bf7d3900c749b7510db90e3243170022823469321da84049a368f3369
                                                        • Instruction ID: e08acadd7403fdeade80d8642b3d9882f1bd2e9c4e5e1caa0038f7282c100df5
                                                        • Opcode Fuzzy Hash: 3359e37bf7d3900c749b7510db90e3243170022823469321da84049a368f3369
                                                        • Instruction Fuzzy Hash: 9581F0B0905A48CFC7C6DF7EA9606197BE6FB88B06750812BD518CB332E7704489EF12
                                                        APIs
                                                        • _memset.LIBCMT ref: 00ED4370
                                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00ED4415
                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00ED4432
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_$_memset
                                                        • String ID:
                                                        • API String ID: 1505330794-0
                                                        • Opcode ID: b63ddb0cab6231b59a6e170e981e777e0957058b6e602941e47042764b702491
                                                        • Instruction ID: f6aaf6c13f55c623ebbe43e2aa62441f622fc4bef2acf958e4390969d66e33e9
                                                        • Opcode Fuzzy Hash: b63ddb0cab6231b59a6e170e981e777e0957058b6e602941e47042764b702491
                                                        • Instruction Fuzzy Hash: E131BFB05047018FC721EF24D88469BBBF8FB58708F00092FE69A96391E770A945DB92
                                                        APIs
                                                        • __FF_MSGBANNER.LIBCMT ref: 00EF5733
                                                          • Part of subcall function 00EFA16B: __NMSG_WRITE.LIBCMT ref: 00EFA192
                                                          • Part of subcall function 00EFA16B: __NMSG_WRITE.LIBCMT ref: 00EFA19C
                                                        • __NMSG_WRITE.LIBCMT ref: 00EF573A
                                                          • Part of subcall function 00EFA1C8: GetModuleFileNameW.KERNEL32(00000000,00F933BA,00000104,?,00000001,00000000), ref: 00EFA25A
                                                          • Part of subcall function 00EFA1C8: ___crtMessageBoxW.LIBCMT ref: 00EFA308
                                                          • Part of subcall function 00EF309F: ___crtCorExitProcess.LIBCMT ref: 00EF30A5
                                                          • Part of subcall function 00EF309F: ExitProcess.KERNEL32 ref: 00EF30AE
                                                          • Part of subcall function 00EF8B28: __getptd_noexit.LIBCMT ref: 00EF8B28
                                                        • RtlAllocateHeap.NTDLL(01780000,00000000,00000001,00000000,?,?,?,00EF0DD3,?), ref: 00EF575F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                        • String ID:
                                                        • API String ID: 1372826849-0
                                                        • Opcode ID: d1f1c14eb3d1d41fe9340adafb32f4d212a8c6b4f2de24ae2d9d2c0cc57aa4f2
                                                        • Instruction ID: 695cddb7472ea1c0bc0e18efda0584585a1dd643b45b91ba351dbeb5bd70e09a
                                                        • Opcode Fuzzy Hash: d1f1c14eb3d1d41fe9340adafb32f4d212a8c6b4f2de24ae2d9d2c0cc57aa4f2
                                                        • Instruction Fuzzy Hash: 3F01D276301B0DDAD6153734EC42A7E73888B62366F112427F719BB1C2DE7099005660
                                                        APIs
                                                        • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00F39548,?,?,?,?,?,00000004), ref: 00F398BB
                                                        • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00F39548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00F398D1
                                                        • CloseHandle.KERNEL32(00000000,?,00F39548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00F398D8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: File$CloseCreateHandleTime
                                                        • String ID:
                                                        • API String ID: 3397143404-0
                                                        • Opcode ID: 60698224a4db88f92cab26f8bb60b7a920d3f8a1602e34a4299b41bf0e9d65a7
                                                        • Instruction ID: 20379ac0a52250a3045cb75d7c0508f3bcca5c5cec0bd86167907ad0b6f9b0ec
                                                        • Opcode Fuzzy Hash: 60698224a4db88f92cab26f8bb60b7a920d3f8a1602e34a4299b41bf0e9d65a7
                                                        • Instruction Fuzzy Hash: 7DE08632141718B7E7212B54EC09FCA7B19AB06771F104120FB14A90E087B11515A7D8
                                                        APIs
                                                        • _free.LIBCMT ref: 00F38D1B
                                                          • Part of subcall function 00EF2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00EF9A24), ref: 00EF2D69
                                                          • Part of subcall function 00EF2D55: GetLastError.KERNEL32(00000000,?,00EF9A24), ref: 00EF2D7B
                                                        • _free.LIBCMT ref: 00F38D2C
                                                        • _free.LIBCMT ref: 00F38D3E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                        • Instruction ID: 90e8abbe168ee9191aecbef0f468b5a669aae7b0f8c84f2701fa4caeae6f65d6
                                                        • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                                                        • Instruction Fuzzy Hash: 64E012A1A0170946CB24A578A941AA353DC4F583B2B14191DB60DE7186CF68F8439124
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: CALL
                                                        • API String ID: 0-4196123274
                                                        • Opcode ID: 6d8ad1b91bed51d4fc16736556a6f5e451e8857aea96fce2c3a6015ec297ee9b
                                                        • Instruction ID: 528b7e2af66eea44686a543234b8ed379ec55ad08094dfb1421d89c83ad5eff6
                                                        • Opcode Fuzzy Hash: 6d8ad1b91bed51d4fc16736556a6f5e451e8857aea96fce2c3a6015ec297ee9b
                                                        • Instruction Fuzzy Hash: DC225A70508301DFCB24DF14C450A6AB7E1FF84314F19996EE88AAB362D735ED86DB82
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID: EA06
                                                        • API String ID: 4104443479-3962188686
                                                        • Opcode ID: 8471d457aa9bbd1a76073677909cf297708990271cf7e55d2eb88b750cc9c270
                                                        • Instruction ID: d2892cead58faf0a36faa85cee668e8680c8e97be74bd086cff7043d44097cb7
                                                        • Opcode Fuzzy Hash: 8471d457aa9bbd1a76073677909cf297708990271cf7e55d2eb88b750cc9c270
                                                        • Instruction Fuzzy Hash: D3415CA1A0415C6BDF219B548891BFE7FE3DB65300F286477EC82BB3C2D6319D4693A1
                                                        APIs
                                                        • IsThemeActive.UXTHEME ref: 00ED4834
                                                          • Part of subcall function 00EF336C: __lock.LIBCMT ref: 00EF3372
                                                          • Part of subcall function 00EF336C: DecodePointer.KERNEL32(00000001,?,00ED4849,00F27C74), ref: 00EF337E
                                                          • Part of subcall function 00EF336C: EncodePointer.KERNEL32(?,?,00ED4849,00F27C74), ref: 00EF3389
                                                          • Part of subcall function 00ED48FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00ED4915
                                                          • Part of subcall function 00ED48FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00ED492A
                                                          • Part of subcall function 00ED3B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00ED3B68
                                                          • Part of subcall function 00ED3B3A: IsDebuggerPresent.KERNEL32 ref: 00ED3B7A
                                                          • Part of subcall function 00ED3B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,00F952F8,00F952E0,?,?), ref: 00ED3BEB
                                                          • Part of subcall function 00ED3B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00ED3C6F
                                                        • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00ED4874
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                                                        • String ID:
                                                        • API String ID: 1438897964-0
                                                        • Opcode ID: f1399e52a107fe467621fdd3ef54ff9140da671453535e05e7eff02998232807
                                                        • Instruction ID: cb6e1c63f96e8405cf447d9aae044c26d7c84c9ce3e3b6102a199c39d6357225
                                                        • Opcode Fuzzy Hash: f1399e52a107fe467621fdd3ef54ff9140da671453535e05e7eff02998232807
                                                        • Instruction Fuzzy Hash: E6119D719083499BC700EF79EC0590ABFE8EF99B50F10451FF040A32B1DB719549EB92
                                                        APIs
                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00ED5821,?,?,?,?), ref: 00ED5CC7
                                                        • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00ED5821,?,?,?,?), ref: 00F0DD73
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: e4c27ba9106fa8cfab9ae9b603e80f5fa327e39c501802ccad0968bafb28f509
                                                        • Instruction ID: 70530dcef080fc3f6e0f4a71e7124a5fb250b0889e08f716ea718cc06cef1eaf
                                                        • Opcode Fuzzy Hash: e4c27ba9106fa8cfab9ae9b603e80f5fa327e39c501802ccad0968bafb28f509
                                                        • Instruction Fuzzy Hash: 90018471244708BEF7200E24CC8AF7676DCEB01768F148316BBD5AA2E0C6B51C4A9B50
                                                        APIs
                                                          • Part of subcall function 00EF571C: __FF_MSGBANNER.LIBCMT ref: 00EF5733
                                                          • Part of subcall function 00EF571C: __NMSG_WRITE.LIBCMT ref: 00EF573A
                                                          • Part of subcall function 00EF571C: RtlAllocateHeap.NTDLL(01780000,00000000,00000001,00000000,?,?,?,00EF0DD3,?), ref: 00EF575F
                                                        • std::exception::exception.LIBCMT ref: 00EF0DEC
                                                        • __CxxThrowException@8.LIBCMT ref: 00EF0E01
                                                          • Part of subcall function 00EF859B: RaiseException.KERNEL32(?,?,?,00F89E78,00000000,?,?,?,?,00EF0E06,?,00F89E78,?,00000001), ref: 00EF85F0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 3902256705-0
                                                        • Opcode ID: 7790e26a17c83aea79a0fdabc465a7387a977a882901c5587edb10ebcdfe139e
                                                        • Instruction ID: 1f362db2de49e407b6377c3a6fc20dcba0bad41077e07e9114d53c8404cd8c63
                                                        • Opcode Fuzzy Hash: 7790e26a17c83aea79a0fdabc465a7387a977a882901c5587edb10ebcdfe139e
                                                        • Instruction Fuzzy Hash: 9AF0A43190021E67CB10BAA4ED019FE7BEC9F01355F105426FB14B6183EFB19A40D6D1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __lock_file_memset
                                                        • String ID:
                                                        • API String ID: 26237723-0
                                                        • Opcode ID: 3252858b05c768c55781ee39c68c8aef14c047f93c279e5124aec4c17b6ce946
                                                        • Instruction ID: 67107672b9e73fa2ae7f667d3221db29361a151a198e28d02a510c12df297688
                                                        • Opcode Fuzzy Hash: 3252858b05c768c55781ee39c68c8aef14c047f93c279e5124aec4c17b6ce946
                                                        • Instruction Fuzzy Hash: CC01FC72800A0CEBCF12AF648D024BE7BA1AFA0321F419115F73476151DB318611DF91
                                                        APIs
                                                          • Part of subcall function 00EF8B28: __getptd_noexit.LIBCMT ref: 00EF8B28
                                                        • __lock_file.LIBCMT ref: 00EF53EB
                                                          • Part of subcall function 00EF6C11: __lock.LIBCMT ref: 00EF6C34
                                                        • __fclose_nolock.LIBCMT ref: 00EF53F6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                        • String ID:
                                                        • API String ID: 2800547568-0
                                                        • Opcode ID: 96dea23721edc34a72e306a9564c7d77a4efcc7eed577b68ab26ee440c5706c0
                                                        • Instruction ID: 9d9f2fb540ec3fb4de13feeb293503fe977077c06cb5f411bba59e7d271efe5a
                                                        • Opcode Fuzzy Hash: 96dea23721edc34a72e306a9564c7d77a4efcc7eed577b68ab26ee440c5706c0
                                                        • Instruction Fuzzy Hash: ADF09632901A0C9ADB116F799D017BD66E06F51374F20A105A764BB1C5CBFC89416B52
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,?,?,00ED542F,?,?,?,?,?), ref: 00ED807A
                                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,?,?,?,00ED542F,?,?,?,?,?), ref: 00ED80AD
                                                          • Part of subcall function 00ED774D: _memmove.LIBCMT ref: 00ED7789
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$_memmove
                                                        • String ID:
                                                        • API String ID: 3033907384-0
                                                        • Opcode ID: 652715a19cfe19b7715ec0a1f06dba04f8852f1ebb8851e530fbb57879a3da65
                                                        • Instruction ID: 76cb6d61e126157e88d198d0f437ddf248dd5f01800b2d5dde75ca7ef62e122c
                                                        • Opcode Fuzzy Hash: 652715a19cfe19b7715ec0a1f06dba04f8852f1ebb8851e530fbb57879a3da65
                                                        • Instruction Fuzzy Hash: D201A271201208BFEB246B21DD46F7B3BADEF85360F10802AFA05EE291DE319801D661
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 017EADED
                                                        • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 017EAE11
                                                        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 017EAE33
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1711926957.00000000017E9000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E9000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17e9000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                        • String ID:
                                                        • API String ID: 2438371351-0
                                                        • Opcode ID: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                        • Instruction ID: 708aa393089385ff22805fdc91c38c1f1262c5c3d75db57ec70ed54ec3b120fc
                                                        • Opcode Fuzzy Hash: 935c44ad8318b3af66d252774f477c9026677184fbf87e93bc0843909b837ee7
                                                        • Instruction Fuzzy Hash: 7412DD24E24658C6EB24DF64D8547DEB272EF68300F1090E9910DEB7A4E77A4F81CF5A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1ae04c95201d12811f2796a6e34b0a1accb9a3dc4ce8c324843d82d44b291463
                                                        • Instruction ID: 04fb14de1c115786ded4d64bf7ace95abecbdfa49838a4fcd979cbc532d4592b
                                                        • Opcode Fuzzy Hash: 1ae04c95201d12811f2796a6e34b0a1accb9a3dc4ce8c324843d82d44b291463
                                                        • Instruction Fuzzy Hash: 91517E35A00604ABCF14EF68C991EAE77EAAF45324F149169F906BB392DB30ED01DB51
                                                        APIs
                                                        • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00ED5B96
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: FilePointer
                                                        • String ID:
                                                        • API String ID: 973152223-0
                                                        • Opcode ID: 668b75c9aef594633b175fe781dedaefb3274175c46b6f7d7031e271712998db
                                                        • Instruction ID: 22bcf5b9a9bb203978480a20e40725e2b4c73caa59fb955193d3194e0c83cbd2
                                                        • Opcode Fuzzy Hash: 668b75c9aef594633b175fe781dedaefb3274175c46b6f7d7031e271712998db
                                                        • Instruction Fuzzy Hash: CC313C32A00A09AFCB18DF6CC480AADF7B5FF44314F14962BD815A7750D770B991CB90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction ID: de01eca886c0d1fe7843b9017b02257ffe957a32f26a6d32d96838476727f10f
                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction Fuzzy Hash: B231F3B4A001099BC718DF08C484A79F7A6FB49314B24A7A5E90AEB356D731EDC1DBC0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: c4ffd7c0912fd3f7691291a8cae1351d62abd357f03ef0924fdcb9253831888e
                                                        • Instruction ID: 1a753de0146947791323f4e3965ff51a09f160c1f547dd8877074aa169276a9c
                                                        • Opcode Fuzzy Hash: c4ffd7c0912fd3f7691291a8cae1351d62abd357f03ef0924fdcb9253831888e
                                                        • Instruction Fuzzy Hash: 49412574A04341CFDB24CF24C444B1ABBE1FF45318F0998ADE9999B762C731E84ACB42
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: ec35f47816db9e71a135f70dcd9762ac2a40af231b5cfde1e8723787a431fb1a
                                                        • Instruction ID: 7001f5e7e83079d9556c5ef38094c820b9c645e3ba0c3098cd023a42c5bc05ff
                                                        • Opcode Fuzzy Hash: ec35f47816db9e71a135f70dcd9762ac2a40af231b5cfde1e8723787a431fb1a
                                                        • Instruction Fuzzy Hash: 60210272904A08EBEB149F91E8806BA7FB8FF40310F21C86AE485E6191EBB094D0F751
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _wcscmp
                                                        • String ID:
                                                        • API String ID: 856254489-0
                                                        • Opcode ID: f5555ede9017fb9406ffcb3e947b0acc3db2da6d343fa3e0934f287257943d4e
                                                        • Instruction ID: 5261055ce547346b7c04d1fbaa58f4ea2ac7c14d3a6a96842956fd0849a7d8c3
                                                        • Opcode Fuzzy Hash: f5555ede9017fb9406ffcb3e947b0acc3db2da6d343fa3e0934f287257943d4e
                                                        • Instruction Fuzzy Hash: 6911D232900119DBCF14EB69DC419EEB7B8FF90360F105117F825B7290EA319D06DB90
                                                        APIs
                                                          • Part of subcall function 00ED4BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00ED4BEF
                                                          • Part of subcall function 00EF525B: __wfsopen.LIBCMT ref: 00EF5266
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00F952F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00ED4E0F
                                                          • Part of subcall function 00ED4B6A: FreeLibrary.KERNEL32(00000000), ref: 00ED4BA4
                                                          • Part of subcall function 00ED4C70: _memmove.LIBCMT ref: 00ED4CBA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Library$Free$Load__wfsopen_memmove
                                                        • String ID:
                                                        • API String ID: 1396898556-0
                                                        • Opcode ID: bc5f77cb0570b77f9e17afc7fa37d37761596f5dc8ec3c64f0170085dec25a22
                                                        • Instruction ID: 6c5332a8795e9fe3fed5f3c8e805e530168bf71b94f691cc5b2c4537050c5c66
                                                        • Opcode Fuzzy Hash: bc5f77cb0570b77f9e17afc7fa37d37761596f5dc8ec3c64f0170085dec25a22
                                                        • Instruction Fuzzy Hash: F4119471600209BBCF15BFB0C816FAD77E5EF64710F10842AF945BB2C1EA719A06A751
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ClearVariant
                                                        • String ID:
                                                        • API String ID: 1473721057-0
                                                        • Opcode ID: ecbd88a73bcc5c10b05ee5a01690539cfc81c80dbefbb362eb9ace0d8fba2d74
                                                        • Instruction ID: d98c2ea0cfe410088b215b108a4b641a78bea562d53a842582127637da15c864
                                                        • Opcode Fuzzy Hash: ecbd88a73bcc5c10b05ee5a01690539cfc81c80dbefbb362eb9ace0d8fba2d74
                                                        • Instruction Fuzzy Hash: 2E213774908305DFCB14DF24C444A1ABBE1FF84314F099969E98967722D731E809DB52
                                                        APIs
                                                        • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00ED56A7,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00ED5C16
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: FileRead
                                                        • String ID:
                                                        • API String ID: 2738559852-0
                                                        • Opcode ID: 5a3db421508fc3614c5a3e60d1452561c9305296a57b15fd041830d78f45abb2
                                                        • Instruction ID: 61bc6e24f286a500d359a4851e444e96682d46db780da4e115c1833b84d74d7c
                                                        • Opcode Fuzzy Hash: 5a3db421508fc3614c5a3e60d1452561c9305296a57b15fd041830d78f45abb2
                                                        • Instruction Fuzzy Hash: 6B113A32200B049FD320CF19C880B62B7E4EF44764F10D92FE9AA96A51D771F846CB60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: a7b9d5836668f83c2a3f51eb8053bbd8b90c3f0a49dd782c3ce1182c41f61193
                                                        • Instruction ID: 2f5b1c4afa727070b73c17e0f9b13c81c6c9ced12a63857ee29a8d3c6e14613b
                                                        • Opcode Fuzzy Hash: a7b9d5836668f83c2a3f51eb8053bbd8b90c3f0a49dd782c3ce1182c41f61193
                                                        • Instruction Fuzzy Hash: 850184B9200901AFC305DB68C451D2AF7E9FF85310714856AF519D7702D735EC22CBE0
                                                        APIs
                                                        • __lock_file.LIBCMT ref: 00EF48A6
                                                          • Part of subcall function 00EF8B28: __getptd_noexit.LIBCMT ref: 00EF8B28
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __getptd_noexit__lock_file
                                                        • String ID:
                                                        • API String ID: 2597487223-0
                                                        • Opcode ID: 2e6e3f2659f0f10772274927403d83e106291718867e9c565c989a737121010b
                                                        • Instruction ID: 46d53f0ba31b10b0020442a4ac58c09dbd2c93f8d58f6555dac9ff095e89c0f4
                                                        • Opcode Fuzzy Hash: 2e6e3f2659f0f10772274927403d83e106291718867e9c565c989a737121010b
                                                        • Instruction Fuzzy Hash: 6AF0FFB190028CABDF15AFB48C063FF36E0AF00364F04A404B624BA1C1DBB88950DB41
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,?,00F952F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00ED4E7E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID:
                                                        • API String ID: 3664257935-0
                                                        • Opcode ID: 18e72594355c58fc4ee6683f0a9fae7badf92ff5cf8cc49f86191635ff95ccf7
                                                        • Instruction ID: cce5f0f8db13face106f6f52ab19b4c2f994a2c1dfc85f673f416405f60b438e
                                                        • Opcode Fuzzy Hash: 18e72594355c58fc4ee6683f0a9fae7badf92ff5cf8cc49f86191635ff95ccf7
                                                        • Instruction Fuzzy Hash: 9DF01CB1501711DFCB349F64D494852B7E1FF24329310997EE6D696750C7319845DB40
                                                        APIs
                                                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00EF07B0
                                                          • Part of subcall function 00ED7BCC: _memmove.LIBCMT ref: 00ED7C06
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: LongNamePath_memmove
                                                        • String ID:
                                                        • API String ID: 2514874351-0
                                                        • Opcode ID: ea27893251ea094b39920d0fef037dcedfc40d9c4763ca3e6e9229f7f2127c23
                                                        • Instruction ID: eb3f41d446ea564d2d7925a7373243ce08fd7804b66e173efae9175a00e409a0
                                                        • Opcode Fuzzy Hash: ea27893251ea094b39920d0fef037dcedfc40d9c4763ca3e6e9229f7f2127c23
                                                        • Instruction Fuzzy Hash: 8EE0867690422857C720A6689C05FEA77DDDB887A1F0441B6FD0CD7244D9659C909690
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __fread_nolock
                                                        • String ID:
                                                        • API String ID: 2638373210-0
                                                        • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                        • Instruction ID: 5b17c6ff49197f378dc21ad33780d82e8ae16eb6d5a58c172173447f9af6daa6
                                                        • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                                                        • Instruction Fuzzy Hash: E6E092B1504B045FD7398A24D800BA373E1AB05325F00085DF6AA93241EB6278869759
                                                        APIs
                                                        • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00F0DD42,?,?,00000000), ref: 00ED5C5F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: FilePointer
                                                        • String ID:
                                                        • API String ID: 973152223-0
                                                        • Opcode ID: f38a94b78dc7fbe3b1c93bcd4b51cac7481f60e6dbcbff23453552b131c0de96
                                                        • Instruction ID: aaa613e7374e15ea11eeea44bcacf960042ea187fc4a0c80fc0bae020d423339
                                                        • Opcode Fuzzy Hash: f38a94b78dc7fbe3b1c93bcd4b51cac7481f60e6dbcbff23453552b131c0de96
                                                        • Instruction Fuzzy Hash: E3D09E7464020CBFE610DB80DC46FAA777CD705711F100194BE049629096B27D549695
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __wfsopen
                                                        • String ID:
                                                        • API String ID: 197181222-0
                                                        • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                        • Instruction ID: 9b28019e21cc881e5070377bfa499a8c979ff45a1c17a9c5ad721b55429ebafd
                                                        • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                                                        • Instruction Fuzzy Hash: E9B0927644020C77DE012A82FC02A593F699B51764F808020FB0C28172A673A6649A89
                                                        APIs
                                                        • GetLastError.KERNEL32(00000002,00000000), ref: 00F3D1FF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast
                                                        • String ID:
                                                        • API String ID: 1452528299-0
                                                        • Opcode ID: 4713a4360f88a5d743ea82a52e254c43b1583eaf9e19bccf3c393107580cdd1b
                                                        • Instruction ID: 49d910aa460d2c3ad950b6a3aa1f3f6f4b06a9651b9c8cfc003e710efda75111
                                                        • Opcode Fuzzy Hash: 4713a4360f88a5d743ea82a52e254c43b1583eaf9e19bccf3c393107580cdd1b
                                                        • Instruction Fuzzy Hash: 3A7183756043018FD704EF24D491A6EB7E0EF89364F04596EF8969B3A2DB30ED0ADB52
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 017EB5D1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1711926957.00000000017E9000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E9000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17e9000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                        • Instruction ID: 623c36f5b414e8caee52be5237a7e2697d909cadb98c5f7cbb2f2ba46df0c003
                                                        • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                        • Instruction Fuzzy Hash: B2E09A7494010DAFDB00EFA4D54969E7BB4EF04301F1005A1FD05D7681DA309A548A62
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 017EB5D1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1711926957.00000000017E9000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E9000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17e9000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction ID: 97e38a5bb54395558ae87229f92467b1662bc9bbf168e9b50fa0370dcdd923c1
                                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction Fuzzy Hash: 3EE0BF7494010D9FDB00EFA4D54969E7FF4EF04301F100161FD01D2281D6309A508A62
                                                        APIs
                                                          • Part of subcall function 00ED2612: GetWindowLongW.USER32(?,000000EB), ref: 00ED2623
                                                        • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00F5CB37
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F5CB95
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00F5CBD6
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F5CC00
                                                        • SendMessageW.USER32 ref: 00F5CC29
                                                        • _wcsncpy.LIBCMT ref: 00F5CC95
                                                        • GetKeyState.USER32(00000011), ref: 00F5CCB6
                                                        • GetKeyState.USER32(00000009), ref: 00F5CCC3
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F5CCD9
                                                        • GetKeyState.USER32(00000010), ref: 00F5CCE3
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F5CD0C
                                                        • SendMessageW.USER32 ref: 00F5CD33
                                                        • SendMessageW.USER32(?,00001030,?,00F5B348), ref: 00F5CE37
                                                        • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00F5CE4D
                                                        • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00F5CE60
                                                        • SetCapture.USER32(?), ref: 00F5CE69
                                                        • ClientToScreen.USER32(?,?), ref: 00F5CECE
                                                        • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00F5CEDB
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F5CEF5
                                                        • ReleaseCapture.USER32 ref: 00F5CF00
                                                        • GetCursorPos.USER32(?), ref: 00F5CF3A
                                                        • ScreenToClient.USER32(?,?), ref: 00F5CF47
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F5CFA3
                                                        • SendMessageW.USER32 ref: 00F5CFD1
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F5D00E
                                                        • SendMessageW.USER32 ref: 00F5D03D
                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00F5D05E
                                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00F5D06D
                                                        • GetCursorPos.USER32(?), ref: 00F5D08D
                                                        • ScreenToClient.USER32(?,?), ref: 00F5D09A
                                                        • GetParent.USER32(?), ref: 00F5D0BA
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F5D123
                                                        • SendMessageW.USER32 ref: 00F5D154
                                                        • ClientToScreen.USER32(?,?), ref: 00F5D1B2
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00F5D1E2
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F5D20C
                                                        • SendMessageW.USER32 ref: 00F5D22F
                                                        • ClientToScreen.USER32(?,?), ref: 00F5D281
                                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00F5D2B5
                                                          • Part of subcall function 00ED25DB: GetWindowLongW.USER32(?,000000EB), ref: 00ED25EC
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00F5D351
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                        • String ID: @GUI_DRAGID$F
                                                        • API String ID: 3977979337-4164748364
                                                        • Opcode ID: f6019c212ff82e2b22390781f8419d83b25c97b53a7a31ad827d72270ae721ac
                                                        • Instruction ID: 61609895dcb59f2fd3ce9f2ff3fc0f085c60156815dbdffa94ff92abc9e3078c
                                                        • Opcode Fuzzy Hash: f6019c212ff82e2b22390781f8419d83b25c97b53a7a31ad827d72270ae721ac
                                                        • Instruction Fuzzy Hash: F542BD34604344AFDB21CF24C844BAABBE5FF89722F140559FB96972B1C731D848EB92
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memmove$_memset
                                                        • String ID: 3c$DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_
                                                        • API String ID: 1357608183-3681475764
                                                        • Opcode ID: bc33d6403e2491b15b0b41d92404b4105b6f9e90853b026e9e68025d42ce9e70
                                                        • Instruction ID: 53627836395d1927634fd4d25edb825b5fc78dd6a8e5e6699906f57275201d6b
                                                        • Opcode Fuzzy Hash: bc33d6403e2491b15b0b41d92404b4105b6f9e90853b026e9e68025d42ce9e70
                                                        • Instruction Fuzzy Hash: 0493B575E04229DFDB24CF98D881BADB7B1FF48320F25816AE945EB281E7749D81DB40
                                                        APIs
                                                        • GetForegroundWindow.USER32(00000000,?), ref: 00ED48DF
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F0D665
                                                        • IsIconic.USER32(?), ref: 00F0D66E
                                                        • ShowWindow.USER32(?,00000009), ref: 00F0D67B
                                                        • SetForegroundWindow.USER32(?), ref: 00F0D685
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F0D69B
                                                        • GetCurrentThreadId.KERNEL32 ref: 00F0D6A2
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F0D6AE
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F0D6BF
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F0D6C7
                                                        • AttachThreadInput.USER32(00000000,?,00000001), ref: 00F0D6CF
                                                        • SetForegroundWindow.USER32(?), ref: 00F0D6D2
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F0D6E7
                                                        • keybd_event.USER32(00000012,00000000), ref: 00F0D6F2
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F0D6FC
                                                        • keybd_event.USER32(00000012,00000000), ref: 00F0D701
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F0D70A
                                                        • keybd_event.USER32(00000012,00000000), ref: 00F0D70F
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F0D719
                                                        • keybd_event.USER32(00000012,00000000), ref: 00F0D71E
                                                        • SetForegroundWindow.USER32(?), ref: 00F0D721
                                                        • AttachThreadInput.USER32(?,?,00000000), ref: 00F0D748
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 4125248594-2988720461
                                                        • Opcode ID: 76ce4ff902b6de19ccdfc1f43803d3ac8530904eaf52728c6904fbf25026575b
                                                        • Instruction ID: 9280b8fd6204d3c5e419d5c6c6cd0f4dcb6984662eff3d501e2963d85a613afe
                                                        • Opcode Fuzzy Hash: 76ce4ff902b6de19ccdfc1f43803d3ac8530904eaf52728c6904fbf25026575b
                                                        • Instruction Fuzzy Hash: 81317071A4031CBBEB206BA19C89F7F7E6CEB44B61F144065FB05EB1D1DAB05901BBA1
                                                        APIs
                                                          • Part of subcall function 00F287E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F2882B
                                                          • Part of subcall function 00F287E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F28858
                                                          • Part of subcall function 00F287E1: GetLastError.KERNEL32 ref: 00F28865
                                                        • _memset.LIBCMT ref: 00F28353
                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00F283A5
                                                        • CloseHandle.KERNEL32(?), ref: 00F283B6
                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00F283CD
                                                        • GetProcessWindowStation.USER32 ref: 00F283E6
                                                        • SetProcessWindowStation.USER32(00000000), ref: 00F283F0
                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00F2840A
                                                          • Part of subcall function 00F281CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F28309), ref: 00F281E0
                                                          • Part of subcall function 00F281CB: CloseHandle.KERNEL32(?,?,00F28309), ref: 00F281F2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                        • String ID: $default$winsta0
                                                        • API String ID: 2063423040-1027155976
                                                        • Opcode ID: ae9edde71d59e9b7cad0ee27f97c0757b5347c1e06192d71780ce024b7667da5
                                                        • Instruction ID: 5ddc4c620151544b15ebd58fe8004cb9c9746682ec517343e6ed4a2d9d897b49
                                                        • Opcode Fuzzy Hash: ae9edde71d59e9b7cad0ee27f97c0757b5347c1e06192d71780ce024b7667da5
                                                        • Instruction Fuzzy Hash: FC815C71D0221DAFDF11DFA4EC45AEE7BB8EF04364F184169F910A6161DB358E16EB20
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00F3C78D
                                                        • FindClose.KERNEL32(00000000), ref: 00F3C7E1
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F3C806
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F3C81D
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00F3C844
                                                        • __swprintf.LIBCMT ref: 00F3C890
                                                        • __swprintf.LIBCMT ref: 00F3C8D3
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                        • __swprintf.LIBCMT ref: 00F3C927
                                                          • Part of subcall function 00EF3698: __woutput_l.LIBCMT ref: 00EF36F1
                                                        • __swprintf.LIBCMT ref: 00F3C975
                                                          • Part of subcall function 00EF3698: __flsbuf.LIBCMT ref: 00EF3713
                                                          • Part of subcall function 00EF3698: __flsbuf.LIBCMT ref: 00EF372B
                                                        • __swprintf.LIBCMT ref: 00F3C9C4
                                                        • __swprintf.LIBCMT ref: 00F3CA13
                                                        • __swprintf.LIBCMT ref: 00F3CA62
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                                                        • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                        • API String ID: 3953360268-2428617273
                                                        • Opcode ID: 95c0d114c581450474139125d750e3c11f707adc8832c22fe1868310dcf2a19a
                                                        • Instruction ID: 7a96485285f989d5573b30427f61f4bdadfb1dbcf6a76cbd4fbd7b6e58e6fd18
                                                        • Opcode Fuzzy Hash: 95c0d114c581450474139125d750e3c11f707adc8832c22fe1868310dcf2a19a
                                                        • Instruction Fuzzy Hash: 1AA11FB2404344ABC704EFA4CC85DAFB7ECFF95704F40191AF595D6292EA35DA09CB62
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00F3EFB6
                                                        • _wcscmp.LIBCMT ref: 00F3EFCB
                                                        • _wcscmp.LIBCMT ref: 00F3EFE2
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00F3EFF4
                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 00F3F00E
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00F3F026
                                                        • FindClose.KERNEL32(00000000), ref: 00F3F031
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00F3F04D
                                                        • _wcscmp.LIBCMT ref: 00F3F074
                                                        • _wcscmp.LIBCMT ref: 00F3F08B
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F3F09D
                                                        • SetCurrentDirectoryW.KERNEL32(00F88920), ref: 00F3F0BB
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F3F0C5
                                                        • FindClose.KERNEL32(00000000), ref: 00F3F0D2
                                                        • FindClose.KERNEL32(00000000), ref: 00F3F0E4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                        • String ID: *.*
                                                        • API String ID: 1803514871-438819550
                                                        • Opcode ID: 625e63268b9242c9e93913c6942f1f37a4628cb0ca00ba996b95b482cef90d1e
                                                        • Instruction ID: 8c1c72b55e9d9ef1f1145ee38466973233a0888ea9d5bd5ca682ba9e35fbc40d
                                                        • Opcode Fuzzy Hash: 625e63268b9242c9e93913c6942f1f37a4628cb0ca00ba996b95b482cef90d1e
                                                        • Instruction Fuzzy Hash: 2F31E772D0020D6ADB14ABB8DC48AEE77AC9F44371F1041B6F915E30A1DB70DA49EB61
                                                        APIs
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F50953
                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,00F5F910,00000000,?,00000000,?,?), ref: 00F509C1
                                                        • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00F50A09
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00F50A92
                                                        • RegCloseKey.ADVAPI32(?), ref: 00F50DB2
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00F50DBF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectCreateRegistryValue
                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                        • API String ID: 536824911-966354055
                                                        • Opcode ID: bda8ecb494d88a9dda0b7e6caf27fda68a7d3846ca9dcb79977ef6de1a272768
                                                        • Instruction ID: a11d5d6a4d5fc9abac7931613dbc711d6c6f7a89471c39a16c6a1d063df04789
                                                        • Opcode Fuzzy Hash: bda8ecb494d88a9dda0b7e6caf27fda68a7d3846ca9dcb79977ef6de1a272768
                                                        • Instruction Fuzzy Hash: 89026C756046019FCB14EF14C855E2AB7E5FF89724F04845DF999AB3A2DB30EC06DB81
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00F3F113
                                                        • _wcscmp.LIBCMT ref: 00F3F128
                                                        • _wcscmp.LIBCMT ref: 00F3F13F
                                                          • Part of subcall function 00F34385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00F343A0
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00F3F16E
                                                        • FindClose.KERNEL32(00000000), ref: 00F3F179
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00F3F195
                                                        • _wcscmp.LIBCMT ref: 00F3F1BC
                                                        • _wcscmp.LIBCMT ref: 00F3F1D3
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F3F1E5
                                                        • SetCurrentDirectoryW.KERNEL32(00F88920), ref: 00F3F203
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F3F20D
                                                        • FindClose.KERNEL32(00000000), ref: 00F3F21A
                                                        • FindClose.KERNEL32(00000000), ref: 00F3F22C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                        • String ID: *.*
                                                        • API String ID: 1824444939-438819550
                                                        • Opcode ID: 0d3616ac41d653a814db06e7dd1cc03caa71cbf2d494132e3f45e4f52a6ed34a
                                                        • Instruction ID: 8b5fdfeb3ed9e008f8a1aff7d0fbd62e9c281682fbf69e5da23ca3eb5992184a
                                                        • Opcode Fuzzy Hash: 0d3616ac41d653a814db06e7dd1cc03caa71cbf2d494132e3f45e4f52a6ed34a
                                                        • Instruction Fuzzy Hash: 8231A276D0021DBADB20AAA4EC59AEF77AC9F85371F1041B5E910E20A0DB30DA4DEA54
                                                        APIs
                                                        • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00F3A20F
                                                        • __swprintf.LIBCMT ref: 00F3A231
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F3A26E
                                                        • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00F3A293
                                                        • _memset.LIBCMT ref: 00F3A2B2
                                                        • _wcsncpy.LIBCMT ref: 00F3A2EE
                                                        • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00F3A323
                                                        • CloseHandle.KERNEL32(00000000), ref: 00F3A32E
                                                        • RemoveDirectoryW.KERNEL32(?), ref: 00F3A337
                                                        • CloseHandle.KERNEL32(00000000), ref: 00F3A341
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                        • String ID: :$\$\??\%s
                                                        • API String ID: 2733774712-3457252023
                                                        • Opcode ID: 34c75bdbfff7d51095543224af54617ba0098665a19618c7eb31fc134284a7e6
                                                        • Instruction ID: 6be5a53c67990fdf0b6550567a9fedb1ed27cdf64edf49342fbfc159752d95b7
                                                        • Opcode Fuzzy Hash: 34c75bdbfff7d51095543224af54617ba0098665a19618c7eb31fc134284a7e6
                                                        • Instruction Fuzzy Hash: 9331B2B1900209ABDB21DFA1DC49FEB37BCEF89751F1041B6F608D6160EB7196449B25
                                                        APIs
                                                          • Part of subcall function 00F28202: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F2821E
                                                          • Part of subcall function 00F28202: GetLastError.KERNEL32(?,00F27CE2,?,?,?), ref: 00F28228
                                                          • Part of subcall function 00F28202: GetProcessHeap.KERNEL32(00000008,?,?,00F27CE2,?,?,?), ref: 00F28237
                                                          • Part of subcall function 00F28202: HeapAlloc.KERNEL32(00000000,?,00F27CE2,?,?,?), ref: 00F2823E
                                                          • Part of subcall function 00F28202: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F28255
                                                          • Part of subcall function 00F2829F: GetProcessHeap.KERNEL32(00000008,00F27CF8,00000000,00000000,?,00F27CF8,?), ref: 00F282AB
                                                          • Part of subcall function 00F2829F: HeapAlloc.KERNEL32(00000000,?,00F27CF8,?), ref: 00F282B2
                                                          • Part of subcall function 00F2829F: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00F27CF8,?), ref: 00F282C3
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00F27D13
                                                        • _memset.LIBCMT ref: 00F27D28
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00F27D47
                                                        • GetLengthSid.ADVAPI32(?), ref: 00F27D58
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00F27D95
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00F27DB1
                                                        • GetLengthSid.ADVAPI32(?), ref: 00F27DCE
                                                        • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00F27DDD
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00F27DE4
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00F27E05
                                                        • CopySid.ADVAPI32(00000000), ref: 00F27E0C
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00F27E3D
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00F27E63
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00F27E77
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                        • String ID:
                                                        • API String ID: 3996160137-0
                                                        • Opcode ID: 3a8b5d97af3ebc37fe73be33d2e10a5f111d8e2d94541c4cfd35988f23599215
                                                        • Instruction ID: 524736c7442bb585b3e37d53e32fcbcd212ecfffe5a4573aba687e1e332d8ab7
                                                        • Opcode Fuzzy Hash: 3a8b5d97af3ebc37fe73be33d2e10a5f111d8e2d94541c4cfd35988f23599215
                                                        • Instruction Fuzzy Hash: 8F616C71900619AFDF00DFA0EC44AEEBB79FF04311F0481A9E915A72A1DB359A05EB60
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 3c$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$_
                                                        • API String ID: 0-4228276721
                                                        • Opcode ID: 0c8ade00b1f7dea8dbb79976ffb709fbacdeb7db542345f5bf60f1bb7bcab87e
                                                        • Instruction ID: 7a7647d1f90ea7f8023c1e45dbfd0ef32ee4e86e1f57e2f17fee425c73206876
                                                        • Opcode Fuzzy Hash: 0c8ade00b1f7dea8dbb79976ffb709fbacdeb7db542345f5bf60f1bb7bcab87e
                                                        • Instruction Fuzzy Hash: C2727F71E00269DBDB24CF59D8807AEB7B5FF58310F24816AE809FB291D7709E81DB94
                                                        APIs
                                                        • GetKeyboardState.USER32(?), ref: 00F30097
                                                        • SetKeyboardState.USER32(?), ref: 00F30102
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00F30122
                                                        • GetKeyState.USER32(000000A0), ref: 00F30139
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00F30168
                                                        • GetKeyState.USER32(000000A1), ref: 00F30179
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00F301A5
                                                        • GetKeyState.USER32(00000011), ref: 00F301B3
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00F301DC
                                                        • GetKeyState.USER32(00000012), ref: 00F301EA
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00F30213
                                                        • GetKeyState.USER32(0000005B), ref: 00F30221
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: eb48c75a31932a4e4b0adba787c9abc7cc1dcb7412fe583e5bf54b37d498b650
                                                        • Instruction ID: 43e1bfdf3ba1e18d16bff74c0a5a448530c1c94c2dddb654b42023fcc090111f
                                                        • Opcode Fuzzy Hash: eb48c75a31932a4e4b0adba787c9abc7cc1dcb7412fe583e5bf54b37d498b650
                                                        • Instruction Fuzzy Hash: 8051DC60D0478819FB35EBA488647EABFB49F013B0F08459FD9C1575C2DE649B8CE761
                                                        APIs
                                                          • Part of subcall function 00F50E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F4FDAD,?,?), ref: 00F50E31
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F504AC
                                                          • Part of subcall function 00ED9837: __itow.LIBCMT ref: 00ED9862
                                                          • Part of subcall function 00ED9837: __swprintf.LIBCMT ref: 00ED98AC
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00F5054B
                                                        • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00F505E3
                                                        • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00F50822
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00F5082F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 1240663315-0
                                                        • Opcode ID: b49b4699b1c8b98fcbe56d9f20e24e199b298f89ecf4c1a2653304021328ffc4
                                                        • Instruction ID: 35cce75331dde083322195e72560771ef7fab7f03e2ebb9e50db51797800237d
                                                        • Opcode Fuzzy Hash: b49b4699b1c8b98fcbe56d9f20e24e199b298f89ecf4c1a2653304021328ffc4
                                                        • Instruction Fuzzy Hash: AAE15F71604214AFCB14DF28C891E2ABBE4FF89715F04856DF94ADB2A2DB30ED05DB91
                                                        APIs
                                                          • Part of subcall function 00ED9837: __itow.LIBCMT ref: 00ED9862
                                                          • Part of subcall function 00ED9837: __swprintf.LIBCMT ref: 00ED98AC
                                                        • CoInitialize.OLE32 ref: 00F48403
                                                        • CoUninitialize.OLE32 ref: 00F4840E
                                                        • CoCreateInstance.OLE32(?,00000000,00000017,00F62BEC,?), ref: 00F4846E
                                                        • IIDFromString.OLE32(?,?), ref: 00F484E1
                                                        • VariantInit.OLEAUT32(?), ref: 00F4857B
                                                        • VariantClear.OLEAUT32(?), ref: 00F485DC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                        • API String ID: 834269672-1287834457
                                                        • Opcode ID: 4ccd6ceef0fa419da9204c46b953e035de8c95e32012b0a960b5e70567796db7
                                                        • Instruction ID: b09cd797fc6ca085c3ce190a5ff2d89ad5d8cc1c0f7c64ad9835f9233e3c5b55
                                                        • Opcode Fuzzy Hash: 4ccd6ceef0fa419da9204c46b953e035de8c95e32012b0a960b5e70567796db7
                                                        • Instruction Fuzzy Hash: 496190716083129FC710DF14C848F6EBBE8AF457A4F044459FD859B2A1CB70ED4AEB92
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                        • String ID:
                                                        • API String ID: 1737998785-0
                                                        • Opcode ID: 060d4ebbe5f1d3e79943fe499631f89dc9fa8e9027f08cc87966024e415ea330
                                                        • Instruction ID: 485044dd575535ba322cc40ef261068cb3ad01cd0a389fe5a21f5acc4c0d56b2
                                                        • Opcode Fuzzy Hash: 060d4ebbe5f1d3e79943fe499631f89dc9fa8e9027f08cc87966024e415ea330
                                                        • Instruction Fuzzy Hash: 1A21B5756002149FDB11AF64EC09B6E7BA8FF44721F10806AFE46EB2A1DB70BD41EB54
                                                        APIs
                                                          • Part of subcall function 00ED4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00ED4743,?,?,00ED37AE,?), ref: 00ED4770
                                                          • Part of subcall function 00F34A31: GetFileAttributesW.KERNEL32(?,00F3370B), ref: 00F34A32
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00F338A3
                                                        • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00F3394B
                                                        • MoveFileW.KERNEL32(?,?), ref: 00F3395E
                                                        • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00F3397B
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F3399D
                                                        • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00F339B9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 4002782344-1173974218
                                                        • Opcode ID: aa0664fd7a7875eddcb8db3b51e069c2287c848a568ef5247661be8782e1688d
                                                        • Instruction ID: 8e41d5c27722d707659b0ebfe69d39a672cbc2028556d9f7c27ca30c01c603de
                                                        • Opcode Fuzzy Hash: aa0664fd7a7875eddcb8db3b51e069c2287c848a568ef5247661be8782e1688d
                                                        • Instruction Fuzzy Hash: 1A51917280514C9ACF01EBA4C992DEDB7B9EF14320F6000AAE44277291EF316F0EDB61
                                                        APIs
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                        • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00F3F440
                                                        • Sleep.KERNEL32(0000000A), ref: 00F3F470
                                                        • _wcscmp.LIBCMT ref: 00F3F484
                                                        • _wcscmp.LIBCMT ref: 00F3F49F
                                                        • FindNextFileW.KERNEL32(?,?), ref: 00F3F53D
                                                        • FindClose.KERNEL32(00000000), ref: 00F3F553
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                                                        • String ID: *.*
                                                        • API String ID: 713712311-438819550
                                                        • Opcode ID: f52a7afc3a822f72b12be035d25300cdd6e78f51b874cad4af0859c160f2b094
                                                        • Instruction ID: 22966fcf1acaf5ae2948b878e46da529dec0b312d9a4c610c7c847139ae9a400
                                                        • Opcode Fuzzy Hash: f52a7afc3a822f72b12be035d25300cdd6e78f51b874cad4af0859c160f2b094
                                                        • Instruction Fuzzy Hash: 6C415C72D0021AAFCF54EF64DC55AEEBBB4FF05320F144466E855A3291EB309E49EB50
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __itow__swprintf
                                                        • String ID: 3c$_
                                                        • API String ID: 674341424-4099079164
                                                        • Opcode ID: 9ff63cc2ac11df4a6f4f105336f40bfbd6874cdca41539fdefcc57bd8d661206
                                                        • Instruction ID: 2982017ba8f62e4baac605d47b03655930465c16485f9c8ef281e4f8785ecc0f
                                                        • Opcode Fuzzy Hash: 9ff63cc2ac11df4a6f4f105336f40bfbd6874cdca41539fdefcc57bd8d661206
                                                        • Instruction Fuzzy Hash: 0F22BC716083449FC724DF25C881BAEB7E4EF84714F00592DF99AA7392EB31E945CB92
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID:
                                                        • API String ID: 4104443479-0
                                                        • Opcode ID: 7e46800c35a369c8afd00e420733fc889b90f7d927cf627af9a988fc7199af7d
                                                        • Instruction ID: eec38a59269f32e16b6cc63a3df647523ef4f03922b710d0c0a456815c365171
                                                        • Opcode Fuzzy Hash: 7e46800c35a369c8afd00e420733fc889b90f7d927cf627af9a988fc7199af7d
                                                        • Instruction Fuzzy Hash: A812B971A00619DFDF04DFA5D981AEEB7F5FF48304F10952AE806B7292EB36A911CB50
                                                        APIs
                                                          • Part of subcall function 00ED4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00ED4743,?,?,00ED37AE,?), ref: 00ED4770
                                                          • Part of subcall function 00F34A31: GetFileAttributesW.KERNEL32(?,00F3370B), ref: 00F34A32
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00F33B89
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 00F33BD9
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F33BEA
                                                        • FindClose.KERNEL32(00000000), ref: 00F33C01
                                                        • FindClose.KERNEL32(00000000), ref: 00F33C0A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 2649000838-1173974218
                                                        • Opcode ID: 0adfd9692dc3e45e2af080a8cd6ff93786f8c1a138141250b848e042c2193bd9
                                                        • Instruction ID: 618c285c0316cc8ac124e1ab029f3e26eb5bfd16781d7d4791af81bed18989fa
                                                        • Opcode Fuzzy Hash: 0adfd9692dc3e45e2af080a8cd6ff93786f8c1a138141250b848e042c2193bd9
                                                        • Instruction Fuzzy Hash: 75317E714083859FC301EF24D8918AFB7E8AE95324F405D6EF4E5A2291EB21DA0ED763
                                                        APIs
                                                          • Part of subcall function 00F287E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F2882B
                                                          • Part of subcall function 00F287E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F28858
                                                          • Part of subcall function 00F287E1: GetLastError.KERNEL32 ref: 00F28865
                                                        • ExitWindowsEx.USER32(?,00000000), ref: 00F351F9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                        • String ID: $@$SeShutdownPrivilege
                                                        • API String ID: 2234035333-194228
                                                        • Opcode ID: 9451ccf81bf24ae853be861e2bdf0085e4b15a15ce6463bfd07c013764ad9e30
                                                        • Instruction ID: 1cc384a564c4ecce767480e34c5ac64cc7019d58a0d1fc3106c8cd6962cf134e
                                                        • Opcode Fuzzy Hash: 9451ccf81bf24ae853be861e2bdf0085e4b15a15ce6463bfd07c013764ad9e30
                                                        • Instruction Fuzzy Hash: A8012B32B916156BF7287268AC8AFBB7258DB85B71F240460F903E20D2DA51DC05B590
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000001,00000006), ref: 00F462DC
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F462EB
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 00F46307
                                                        • listen.WSOCK32(00000000,00000005), ref: 00F46316
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F46330
                                                        • closesocket.WSOCK32(00000000), ref: 00F46344
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$bindclosesocketlistensocket
                                                        • String ID:
                                                        • API String ID: 1279440585-0
                                                        • Opcode ID: 1f6bc309907326292a717a79a88b407daab77b68744bbd362cc48dc42163bf95
                                                        • Instruction ID: e9465f496db65f2a189ccc08ad2f4c646a530dfe3cc063f79e8596bbace5b440
                                                        • Opcode Fuzzy Hash: 1f6bc309907326292a717a79a88b407daab77b68744bbd362cc48dc42163bf95
                                                        • Instruction Fuzzy Hash: 0D21DD356002049FCB00AF64DC45A3EBBE8EF49721F14415AE916E73D2C770AC05EB51
                                                        APIs
                                                          • Part of subcall function 00EF0DB6: std::exception::exception.LIBCMT ref: 00EF0DEC
                                                          • Part of subcall function 00EF0DB6: __CxxThrowException@8.LIBCMT ref: 00EF0E01
                                                        • _memmove.LIBCMT ref: 00F20258
                                                        • _memmove.LIBCMT ref: 00F2036D
                                                        • _memmove.LIBCMT ref: 00F20414
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memmove$Exception@8Throwstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 1300846289-0
                                                        • Opcode ID: e02dd09419b582307439513274901d9d6a85b90dcf971b4c84ed336b141ac80e
                                                        • Instruction ID: c617093a41ba8fd4869d35099677ec592bc845bbd41167cfc825f3cfa830353a
                                                        • Opcode Fuzzy Hash: e02dd09419b582307439513274901d9d6a85b90dcf971b4c84ed336b141ac80e
                                                        • Instruction Fuzzy Hash: 4B02CFB1A00219DBCF04DF64D981ABEBBF5EF44310F14806AE806EB296EB31DD51DB91
                                                        APIs
                                                          • Part of subcall function 00ED2612: GetWindowLongW.USER32(?,000000EB), ref: 00ED2623
                                                        • DefDlgProcW.USER32(?,?,?,?,?), ref: 00ED19FA
                                                        • GetSysColor.USER32(0000000F), ref: 00ED1A4E
                                                        • SetBkColor.GDI32(?,00000000), ref: 00ED1A61
                                                          • Part of subcall function 00ED1290: DefDlgProcW.USER32(?,00000020,?), ref: 00ED12D8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ColorProc$LongWindow
                                                        • String ID:
                                                        • API String ID: 3744519093-0
                                                        • Opcode ID: 9339eb75fc04b412e347d11f1d9d5b200fa54cd9e4b76da3a0f2b964c7e06dd3
                                                        • Instruction ID: dc708f54f32bf1bd0a75d51a9bb30f02f663c04fd1d458c936437db4283eb779
                                                        • Opcode Fuzzy Hash: 9339eb75fc04b412e347d11f1d9d5b200fa54cd9e4b76da3a0f2b964c7e06dd3
                                                        • Instruction Fuzzy Hash: 11A15C71106558BEEA28AB284C54EBF359CDB42356F14115FFA02F53D6CA28DD03B3B2
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00F3BCE6
                                                        • _wcscmp.LIBCMT ref: 00F3BD16
                                                        • _wcscmp.LIBCMT ref: 00F3BD2B
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00F3BD3C
                                                        • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00F3BD6C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Find$File_wcscmp$CloseFirstNext
                                                        • String ID:
                                                        • API String ID: 2387731787-0
                                                        • Opcode ID: 2843623b6145918d329d26d8dbe85a67b5c4af727aa3669323548522975410b7
                                                        • Instruction ID: 8a6e8664dfff5e57bf795e30254cb7c398a072e8279c10b4e89374ed44ee72e7
                                                        • Opcode Fuzzy Hash: 2843623b6145918d329d26d8dbe85a67b5c4af727aa3669323548522975410b7
                                                        • Instruction Fuzzy Hash: 1D51AD75A046029FC718DF28C8A1EAAB3E4EF49320F00465EEA56973A1DB30ED05DB91
                                                        APIs
                                                          • Part of subcall function 00F47D8B: inet_addr.WSOCK32(00000000), ref: 00F47DB6
                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00F4679E
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F467C7
                                                        • bind.WSOCK32(00000000,?,00000010), ref: 00F46800
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F4680D
                                                        • closesocket.WSOCK32(00000000), ref: 00F46821
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$bindclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 99427753-0
                                                        • Opcode ID: 6b159979e0d8d779fb75d44bfd486acc8a7ef30f4661c197900860ca93fcc881
                                                        • Instruction ID: 66db8a4c81f1d1cf08fd5203e63ad12707c65f79de8eb378b86bb6039d421736
                                                        • Opcode Fuzzy Hash: 6b159979e0d8d779fb75d44bfd486acc8a7ef30f4661c197900860ca93fcc881
                                                        • Instruction Fuzzy Hash: BD41C275A00214AFDB10BF68DC86F2E77E8DF09B24F048459FA15AB3D3CA749D019792
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                        • String ID:
                                                        • API String ID: 292994002-0
                                                        • Opcode ID: b74cc6ee8afac74ae50acbafc010d3f4a258ebf873d84f659c1775fb998221c4
                                                        • Instruction ID: 4e55134f24e6357f8faff0e7f5c7ec3aac2b3a2c42e3c108435235944501b881
                                                        • Opcode Fuzzy Hash: b74cc6ee8afac74ae50acbafc010d3f4a258ebf873d84f659c1775fb998221c4
                                                        • Instruction Fuzzy Hash: 35110431700A14AFDB216F26DC64A2E7B9AEF44BA2B444029FE49D7241DB70DC06A6A0
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F280C0
                                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F280CA
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F280D9
                                                        • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F280E0
                                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F280F6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: c2a30cd30549c3daa72a9e202d71ff800bf2c8453f3129a0f2c3a37d00764346
                                                        • Instruction ID: e03fb1ae6e5cf79c85004e83fe1da9f2970fa065c90964a9c7afc86e6f8f0c06
                                                        • Opcode Fuzzy Hash: c2a30cd30549c3daa72a9e202d71ff800bf2c8453f3129a0f2c3a37d00764346
                                                        • Instruction Fuzzy Hash: 8FF06231246318AFEB100FA5EC8DE6B3BACEF497A6B040065FA45C7190CB619C56EA60
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00ED4AD0), ref: 00ED4B45
                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00ED4B57
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetNativeSystemInfo$kernel32.dll
                                                        • API String ID: 2574300362-192647395
                                                        • Opcode ID: 8f2c202f5df78076c0b6a840f2b43f9bc9e15e058236a97f90a369bf878c4acf
                                                        • Instruction ID: 83c5c3738465c56322bc51e75cb784f73fe245d86fe0032370397a8435fdc76d
                                                        • Opcode Fuzzy Hash: 8f2c202f5df78076c0b6a840f2b43f9bc9e15e058236a97f90a369bf878c4acf
                                                        • Instruction Fuzzy Hash: 23D0C270A00B17DFC7209F31D818B0276D4AF52346B10887B99C1D6290E670D488D655
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 00F4EE3D
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 00F4EE4B
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 00F4EF0B
                                                        • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00F4EF1A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                                                        • String ID:
                                                        • API String ID: 2576544623-0
                                                        • Opcode ID: 60370ee3686e083f2d76954f8af6428867aaf229f280bfa08377e49a9b1c0228
                                                        • Instruction ID: 8d15dab1b9333a2553ecb49bf6e21a4657ae7e9d16114e7dd4509e241fd22c91
                                                        • Opcode Fuzzy Hash: 60370ee3686e083f2d76954f8af6428867aaf229f280bfa08377e49a9b1c0228
                                                        • Instruction Fuzzy Hash: 825171715047159FD310EF24DC81E6BBBE8FF94710F10582EF995972A1EB709909CB92
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID:
                                                        • API String ID: 3964851224-0
                                                        • Opcode ID: 366b68506fde20a3de7cf827e5c3306037007b2bcc6d6419298bc65a3b96c059
                                                        • Instruction ID: c559046b2e4d7cf259eaf4478ebbf66b501eaa963080d74703dc0cf8ff339b67
                                                        • Opcode Fuzzy Hash: 366b68506fde20a3de7cf827e5c3306037007b2bcc6d6419298bc65a3b96c059
                                                        • Instruction Fuzzy Hash: D1927C70A083858FD720DF15C480B6AB7E1FF85314F14992DE88AAB352D7B5EC85DB92
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00F2E628
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: lstrlen
                                                        • String ID: ($|
                                                        • API String ID: 1659193697-1631851259
                                                        • Opcode ID: 5ef953ebb6ddf106d86b43a71d326f4c93727fb114152f63cf1dd20629569584
                                                        • Instruction ID: 86331dfbefa13cdf97c5268a85c21f9fdaad6af4a3d760d1a532cad739c2af9a
                                                        • Opcode Fuzzy Hash: 5ef953ebb6ddf106d86b43a71d326f4c93727fb114152f63cf1dd20629569584
                                                        • Instruction Fuzzy Hash: 9E323775A007159FDB28CF59D481AAAB7F0FF48320B25C46EE89ADB3A1D770E941CB40
                                                        APIs
                                                        • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00F4180A,00000000), ref: 00F423E1
                                                        • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00F42418
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Internet$AvailableDataFileQueryRead
                                                        • String ID:
                                                        • API String ID: 599397726-0
                                                        • Opcode ID: 01f866ca1bbca3f721b87394c9d83586a0df5347defa71f804f709e34a52c252
                                                        • Instruction ID: 6966324227132ccef0e1ba28e52f7ceeb39c0a9988b64c77fff3d91e3b029122
                                                        • Opcode Fuzzy Hash: 01f866ca1bbca3f721b87394c9d83586a0df5347defa71f804f709e34a52c252
                                                        • Instruction Fuzzy Hash: 4E41F372904209BFEB50DE95DC81FBBBBBCEB40324F50407AFE45A6152EA749E41B660
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00F3B40B
                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00F3B465
                                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00F3B4B2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DiskFreeSpace
                                                        • String ID:
                                                        • API String ID: 1682464887-0
                                                        • Opcode ID: 31e9bf9f2d7790151a66eca2c6304ecaf62ed122c872e8afba3d4aa6fcbe63ff
                                                        • Instruction ID: 4310f7dd76113acce9c2c9944fd39023296a82db641397f3a6f9e35d17ca4bf1
                                                        • Opcode Fuzzy Hash: 31e9bf9f2d7790151a66eca2c6304ecaf62ed122c872e8afba3d4aa6fcbe63ff
                                                        • Instruction Fuzzy Hash: 87215135A00608DFCB00EFA5DC80AEDBBB8FF49314F1480AAE905EB352CB319915DB50
                                                        APIs
                                                          • Part of subcall function 00EF0DB6: std::exception::exception.LIBCMT ref: 00EF0DEC
                                                          • Part of subcall function 00EF0DB6: __CxxThrowException@8.LIBCMT ref: 00EF0E01
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F2882B
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F28858
                                                        • GetLastError.KERNEL32 ref: 00F28865
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                        • String ID:
                                                        • API String ID: 1922334811-0
                                                        • Opcode ID: f9476d0f81a11d29ffc85669b14102e6df0751b663d93c6f6e59ad7c9c078789
                                                        • Instruction ID: 0734dc62a12eb113429989905775b795cfa7cd27075f1f19f813200ca2739af2
                                                        • Opcode Fuzzy Hash: f9476d0f81a11d29ffc85669b14102e6df0751b663d93c6f6e59ad7c9c078789
                                                        • Instruction Fuzzy Hash: FB11BFB2804308AFE718DFA4EC85D6BB7F8EB04311B24856EF55593241EB30BC018B60
                                                        APIs
                                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00F28774
                                                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00F2878B
                                                        • FreeSid.ADVAPI32(?), ref: 00F2879B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                        • String ID:
                                                        • API String ID: 3429775523-0
                                                        • Opcode ID: 8735c310e99ceedc6ef6185c38dc5143e7eac9892e7dce3381ffcd0ef4548cb2
                                                        • Instruction ID: 1919a47b44f1e4bde25cd780212901492c5951e9f3bdeaefd6132ad6d6ba08ea
                                                        • Opcode Fuzzy Hash: 8735c310e99ceedc6ef6185c38dc5143e7eac9892e7dce3381ffcd0ef4548cb2
                                                        • Instruction Fuzzy Hash: D4F04F7591130CBFDF00DFF4DC89AAEB7BCEF08311F1044A9AA01E2181D6715A089B50
                                                        APIs
                                                        • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 00F34CB3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: mouse_event
                                                        • String ID: DOWN
                                                        • API String ID: 2434400541-711622031
                                                        • Opcode ID: 6a91134b6e1fdbc42196577956edeb6ab81679feaa31584e4dd8ec01605ffb75
                                                        • Instruction ID: 6561690969e792872deee8efec52d62175a755ee4894568487c4dede240b39ac
                                                        • Opcode Fuzzy Hash: 6a91134b6e1fdbc42196577956edeb6ab81679feaa31584e4dd8ec01605ffb75
                                                        • Instruction Fuzzy Hash: 88E046221AD72238A9042958BC03EF7128C8B12371B20224AFA10E54C1EE807C8275B9
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00F3C6FB
                                                        • FindClose.KERNEL32(00000000), ref: 00F3C72B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: fa4d2db3ddc26859d41a59f17bb653f1619b91c74e50bded628bf58e9658d276
                                                        • Instruction ID: 66daca8049b54c1f6f1e31df180aa21198e0665b0f604361518e9df0feec1e0c
                                                        • Opcode Fuzzy Hash: fa4d2db3ddc26859d41a59f17bb653f1619b91c74e50bded628bf58e9658d276
                                                        • Instruction Fuzzy Hash: 48118E766002049FDB10EF29DC45A2AF7E8EF85325F00851EF9A9D73A1DB30A805DB81
                                                        APIs
                                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00F49468,?,00F5FB84,?), ref: 00F3A097
                                                        • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00F49468,?,00F5FB84,?), ref: 00F3A0A9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ErrorFormatLastMessage
                                                        • String ID:
                                                        • API String ID: 3479602957-0
                                                        • Opcode ID: 07a5a95624c145b021e4538ef70e91a35145b9f321b6760260a6bff5d7cda734
                                                        • Instruction ID: 9fb5b6da2e06bc5f3974788c4f6ae21fdb1184c92fd6f3634b2f550a7f8a91f7
                                                        • Opcode Fuzzy Hash: 07a5a95624c145b021e4538ef70e91a35145b9f321b6760260a6bff5d7cda734
                                                        • Instruction Fuzzy Hash: 5CF0E23610432DABDB20AFA4CC48FEA736CFF08361F0041A6F948D3180D6309904DBA1
                                                        APIs
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F28309), ref: 00F281E0
                                                        • CloseHandle.KERNEL32(?,?,00F28309), ref: 00F281F2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                        • String ID:
                                                        • API String ID: 81990902-0
                                                        • Opcode ID: 1dae80882df0469395b601b7d2ccfbe073edeedab793fae453da930d12c86b1f
                                                        • Instruction ID: 70b363aab868733c7f963803a82a6d1cecad1131fa1cd08075e33dfcb70666ab
                                                        • Opcode Fuzzy Hash: 1dae80882df0469395b601b7d2ccfbe073edeedab793fae453da930d12c86b1f
                                                        • Instruction Fuzzy Hash: 68E08631001610AFEB212B20FC04D7377E9EF00311714886DF55580471CB215C91EB10
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00EF8D57,?,?,?,00000001), ref: 00EFA15A
                                                        • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00EFA163
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 57a7fca5790c5fc255ee38962d903c779b39291ad0c992a999068a9a14712872
                                                        • Instruction ID: 773c7e12cdaa0b973ac8cb3be7ec47e3d8291cafbdc3c1e0424e9d5612caf2d8
                                                        • Opcode Fuzzy Hash: 57a7fca5790c5fc255ee38962d903c779b39291ad0c992a999068a9a14712872
                                                        • Instruction Fuzzy Hash: 9FB0923105430CABEA002F91ED09B893F68EB46AA3F4040A0F70D84070CB625454AA91
                                                        Strings
                                                        • Variable must be of type 'Object'., xrefs: 00F13E62
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Variable must be of type 'Object'.
                                                        • API String ID: 0-109567571
                                                        • Opcode ID: 54870f9e0bdd01e84540200ab61d1ebbddfc7b5594663b755a4d7c4c23f74ef3
                                                        • Instruction ID: 2bfa8256ebb9ebd3e7cc46a97f1d4afbc01aec6af3bf731577d378f9503c035e
                                                        • Opcode Fuzzy Hash: 54870f9e0bdd01e84540200ab61d1ebbddfc7b5594663b755a4d7c4c23f74ef3
                                                        • Instruction Fuzzy Hash: F0A28D75A00209CFCB24DF58C884AAEB7B2FF59314F24905AE816AF351D775ED82DB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 973b818caf853693d0abb8b596f240d48de94d18c6ac64689341cded386dfcc0
                                                        • Instruction ID: 86ef890d6e9fc176fb77bff4d2e6e00188c0198ae5b43abdcd3b958aa2355bd6
                                                        • Opcode Fuzzy Hash: 973b818caf853693d0abb8b596f240d48de94d18c6ac64689341cded386dfcc0
                                                        • Instruction Fuzzy Hash: 43321721D29F494DD723A634D832335A248AFF73D8F15D737F829B5AAAEB68C4835100
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 327ecc85c2e7882bea7a083c8916d354587f037da265b539810d70441146f086
                                                        • Instruction ID: b2d063f057b0c07ad353ce43728dacf1b95d2c76df70a9a185174e396a5dff27
                                                        • Opcode Fuzzy Hash: 327ecc85c2e7882bea7a083c8916d354587f037da265b539810d70441146f086
                                                        • Instruction Fuzzy Hash: 58B12130D2AF444DD32396398836336B64CAFBB2C5F51D71BFC2670E62EB6285836641
                                                        APIs
                                                        • __time64.LIBCMT ref: 00F3889B
                                                          • Part of subcall function 00EF520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00F38F6E,00000000,?,?,?,?,00F3911F,00000000,?), ref: 00EF5213
                                                          • Part of subcall function 00EF520A: __aulldiv.LIBCMT ref: 00EF5233
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Time$FileSystem__aulldiv__time64
                                                        • String ID:
                                                        • API String ID: 2893107130-0
                                                        • Opcode ID: 49b2e9c5917fd49cb74793c75d9c84f993cf17591cec9884df7d94996addab3a
                                                        • Instruction ID: 2b8db80169412e2c97880db0942db08bac38b9757f6c13ef73d2efe7123103db
                                                        • Opcode Fuzzy Hash: 49b2e9c5917fd49cb74793c75d9c84f993cf17591cec9884df7d94996addab3a
                                                        • Instruction Fuzzy Hash: 9021B432A35610CBC729CF25D841A52B3E1EFA5321F698E6DE1F5CB2D0CA34B905DB54
                                                        APIs
                                                        • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00F28389), ref: 00F287D1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: LogonUser
                                                        • String ID:
                                                        • API String ID: 1244722697-0
                                                        • Opcode ID: 3454ffed5b3edd72482db6cd30441e7d62085984008ae028e550d629f3d3742a
                                                        • Instruction ID: 013e373cf8746083044adfe4071c1e41d614ab43da31d205dfa4d477e084761f
                                                        • Opcode Fuzzy Hash: 3454ffed5b3edd72482db6cd30441e7d62085984008ae028e550d629f3d3742a
                                                        • Instruction Fuzzy Hash: BDD05E3226060EABEF018EA4DC01EAE3B69EB04B01F408111FE15C50A1C775D835AB60
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00EFA12A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: bf5207311d2b60265796e3f27ac954f50d9a7fd08137d139bfc0c44e3aac9018
                                                        • Instruction ID: 5d3543bef3d88f02f8532f3fd0c043d72cacc9ea476df9fd2ccdc93b3ea7ad5e
                                                        • Opcode Fuzzy Hash: bf5207311d2b60265796e3f27ac954f50d9a7fd08137d139bfc0c44e3aac9018
                                                        • Instruction Fuzzy Hash: F7A0123000020CA78A002F41EC044447F5CD7011917004060F50C40031873254105580
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1553b90280301759e4476f6f46f6e1222df5113213de57256db7c47e741b5193
                                                        • Instruction ID: d131ee106b710f70e48a0757fb4b791a78483e32039a5d9bd5b91b43b96fad80
                                                        • Opcode Fuzzy Hash: 1553b90280301759e4476f6f46f6e1222df5113213de57256db7c47e741b5193
                                                        • Instruction Fuzzy Hash: 7A227831D049AACBDF388B56E59437C77A1FB40318F28906BD84EAB492DB70DC91E741
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                        • Instruction ID: 5742148dc02cf7023f59d9eeaa5c73558b55bd538db995048de2e13b1a79b0c6
                                                        • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                                                        • Instruction Fuzzy Hash: DDC1A83220509B4ADF2D463A843403EFBA15EA27B631A279DD6B3EB1D4EF10CA25D610
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                        • Instruction ID: 3e6b04c5aad3dd803b6165c12df29f8d88e99a286fab83e5a42c3956769ecbaf
                                                        • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                                                        • Instruction Fuzzy Hash: 43C1783220519B49DF2D463AC43413EFAA15EE27B631A279DD6B3EF1D4EF10CA25D610
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                        • Instruction ID: c310c53acd42416dad9c0144caa73035bc6c56270554d2d5189b98763fdbaf59
                                                        • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                        • Instruction Fuzzy Hash: 75C1863220519F89DF2D463AC47413EFBA15EA27B631A27DDD5B3EB1C4EE10CA25D620
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1711926957.00000000017E9000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E9000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17e9000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                        • Instruction ID: de889cbfc89724d064fbd9fa87e11ed3297e69bf132bdfacac182adc6c848ba7
                                                        • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                        • Instruction Fuzzy Hash: F841C271D1051CEBCF48CFADC991AAEFBF2AF88201F548299D516AB345D730AB41DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1711926957.00000000017E9000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E9000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17e9000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                        • Instruction ID: 309c5466bc226a3165c0526581966fd0204fe5b8f029220f5348501c502336b7
                                                        • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                        • Instruction Fuzzy Hash: CC018078A00209EFCB49DF98C6949AEF7F5FB48310F208599D819A7345D730AE51DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1711926957.00000000017E9000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E9000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17e9000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                        • Instruction ID: 3c4fd34f8f55c57b0c483759ad6d55fa8f8d4de00cf54c50e299751a8a9c3cc7
                                                        • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                        • Instruction Fuzzy Hash: DD018078A01209EFCB45DF98C6949AEF7F5FB48310F208599D819A7705D730AE51DB80
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1711926957.00000000017E9000.00000040.00000020.00020000.00000000.sdmp, Offset: 017E9000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17e9000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                        • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                        • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                        • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00F4785B
                                                        • DeleteObject.GDI32(00000000), ref: 00F4786D
                                                        • DestroyWindow.USER32 ref: 00F4787B
                                                        • GetDesktopWindow.USER32 ref: 00F47895
                                                        • GetWindowRect.USER32(00000000), ref: 00F4789C
                                                        • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00F479DD
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00F479ED
                                                        • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F47A35
                                                        • GetClientRect.USER32(00000000,?), ref: 00F47A41
                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00F47A7B
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F47A9D
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F47AB0
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F47ABB
                                                        • GlobalLock.KERNEL32(00000000), ref: 00F47AC4
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F47AD3
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00F47ADC
                                                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F47AE3
                                                        • GlobalFree.KERNEL32(00000000), ref: 00F47AEE
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F47B00
                                                        • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00F62CAC,00000000), ref: 00F47B16
                                                        • GlobalFree.KERNEL32(00000000), ref: 00F47B26
                                                        • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00F47B4C
                                                        • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00F47B6B
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F47B8D
                                                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F47D7A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                        • API String ID: 2211948467-2373415609
                                                        • Opcode ID: dd77b723e23522debaa17d345052e911fef477240036f6a9478543120cc84b35
                                                        • Instruction ID: c665709e45d2d59509f1f557ebd67359fa58f835bf1b600e2fc06681580e438c
                                                        • Opcode Fuzzy Hash: dd77b723e23522debaa17d345052e911fef477240036f6a9478543120cc84b35
                                                        • Instruction Fuzzy Hash: 1F027E71900219EFDB14EFA4DC89EAE7BB9FF48311F148159FA15AB2A1C730AD05DB60
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,00F5F910), ref: 00F53627
                                                        • IsWindowVisible.USER32(?), ref: 00F5364B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpperVisibleWindow
                                                        • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                        • API String ID: 4105515805-45149045
                                                        • Opcode ID: 3a25c8d4470e740de31a64f1b2e33e6bd8ac0fba00dd39d3ae43067f34e361d5
                                                        • Instruction ID: 788e48ca71aa3c34d745072d3380e8a5a3ed4fd55bb5b65fb6566a6bfa98d824
                                                        • Opcode Fuzzy Hash: 3a25c8d4470e740de31a64f1b2e33e6bd8ac0fba00dd39d3ae43067f34e361d5
                                                        • Instruction Fuzzy Hash: 97D19E356087019BCB04EF14C951AAE7BE1AF94395F084459FD826B3A3DB35EE0EEB41
                                                        APIs
                                                        • SetTextColor.GDI32(?,00000000), ref: 00F5A630
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00F5A661
                                                        • GetSysColor.USER32(0000000F), ref: 00F5A66D
                                                        • SetBkColor.GDI32(?,000000FF), ref: 00F5A687
                                                        • SelectObject.GDI32(?,00000000), ref: 00F5A696
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00F5A6C1
                                                        • GetSysColor.USER32(00000010), ref: 00F5A6C9
                                                        • CreateSolidBrush.GDI32(00000000), ref: 00F5A6D0
                                                        • FrameRect.USER32(?,?,00000000), ref: 00F5A6DF
                                                        • DeleteObject.GDI32(00000000), ref: 00F5A6E6
                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00F5A731
                                                        • FillRect.USER32(?,?,00000000), ref: 00F5A763
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00F5A78E
                                                          • Part of subcall function 00F5A8CA: GetSysColor.USER32(00000012), ref: 00F5A903
                                                          • Part of subcall function 00F5A8CA: SetTextColor.GDI32(?,?), ref: 00F5A907
                                                          • Part of subcall function 00F5A8CA: GetSysColorBrush.USER32(0000000F), ref: 00F5A91D
                                                          • Part of subcall function 00F5A8CA: GetSysColor.USER32(0000000F), ref: 00F5A928
                                                          • Part of subcall function 00F5A8CA: GetSysColor.USER32(00000011), ref: 00F5A945
                                                          • Part of subcall function 00F5A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F5A953
                                                          • Part of subcall function 00F5A8CA: SelectObject.GDI32(?,00000000), ref: 00F5A964
                                                          • Part of subcall function 00F5A8CA: SetBkColor.GDI32(?,00000000), ref: 00F5A96D
                                                          • Part of subcall function 00F5A8CA: SelectObject.GDI32(?,?), ref: 00F5A97A
                                                          • Part of subcall function 00F5A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 00F5A999
                                                          • Part of subcall function 00F5A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F5A9B0
                                                          • Part of subcall function 00F5A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 00F5A9C5
                                                          • Part of subcall function 00F5A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F5A9ED
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 3521893082-0
                                                        • Opcode ID: 3c63428c3c509ca01e133685ae0b8182893c00060a7781387894d9a3af609f65
                                                        • Instruction ID: dcca96bb4e8f8f904f3e495457182dfe40d6d8c359663e710dae1d808d056f48
                                                        • Opcode Fuzzy Hash: 3c63428c3c509ca01e133685ae0b8182893c00060a7781387894d9a3af609f65
                                                        • Instruction Fuzzy Hash: 16917D72408705AFC7119F64DC08A5B7BA9FF88332F140B69FA62961E1D731D948EB52
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?), ref: 00ED2CA2
                                                        • DeleteObject.GDI32(00000000), ref: 00ED2CE8
                                                        • DeleteObject.GDI32(00000000), ref: 00ED2CF3
                                                        • DestroyIcon.USER32(00000000,?,?,?), ref: 00ED2CFE
                                                        • DestroyWindow.USER32(00000000,?,?,?), ref: 00ED2D09
                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00F0C43B
                                                        • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00F0C474
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00F0C89D
                                                          • Part of subcall function 00ED1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00ED2036,?,00000000,?,?,?,?,00ED16CB,00000000,?), ref: 00ED1B9A
                                                        • SendMessageW.USER32(?,00001053), ref: 00F0C8DA
                                                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00F0C8F1
                                                        • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00F0C907
                                                        • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00F0C912
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                                                        • String ID: 0
                                                        • API String ID: 464785882-4108050209
                                                        • Opcode ID: fd16281c25545c8b932112085750fbe229e113b2634d7405620b7244785da084
                                                        • Instruction ID: c23ccd68e8c678293a32772646e3368ce2d55434f42e03fc22f27144217a5302
                                                        • Opcode Fuzzy Hash: fd16281c25545c8b932112085750fbe229e113b2634d7405620b7244785da084
                                                        • Instruction Fuzzy Hash: 56129E30600201DFDB21CF24C884BA9BBE1FF54311F58466AEA59DB2A2C731EC46FB91
                                                        APIs
                                                        • DestroyWindow.USER32(00000000), ref: 00F474DE
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00F4759D
                                                        • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00F475DB
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00F475ED
                                                        • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00F47633
                                                        • GetClientRect.USER32(00000000,?), ref: 00F4763F
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00F47683
                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00F47692
                                                        • GetStockObject.GDI32(00000011), ref: 00F476A2
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00F476A6
                                                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00F476B6
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F476BF
                                                        • DeleteDC.GDI32(00000000), ref: 00F476C8
                                                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00F476F4
                                                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 00F4770B
                                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00F47746
                                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00F4775A
                                                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00F4776B
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00F4779B
                                                        • GetStockObject.GDI32(00000011), ref: 00F477A6
                                                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00F477B1
                                                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00F477BB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                        • API String ID: 2910397461-517079104
                                                        • Opcode ID: a2352f3989a069cdcafa377936ab1f5c70e0b5e4da0d737792b9d6ef5b4649d3
                                                        • Instruction ID: 20bcf0fdc79cc9a1f20776158d111ae4a5e0311cfe8f8fa112085e409f0bc808
                                                        • Opcode Fuzzy Hash: a2352f3989a069cdcafa377936ab1f5c70e0b5e4da0d737792b9d6ef5b4649d3
                                                        • Instruction Fuzzy Hash: EFA1AFB1A00609BFEB14DBA4DC4AFAE7BB9EB08711F004155FA14EB2E0C770AD05DB60
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00F3AD1E
                                                        • GetDriveTypeW.KERNEL32(?,00F5FAC0,?,\\.\,00F5F910), ref: 00F3ADFB
                                                        • SetErrorMode.KERNEL32(00000000,00F5FAC0,?,\\.\,00F5F910), ref: 00F3AF59
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DriveType
                                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                        • API String ID: 2907320926-4222207086
                                                        • Opcode ID: ccbbfcb5371e837972e8c8d76d991653b60477d6ae3f318ccb5ec5b1e113a226
                                                        • Instruction ID: 039532551d7fc32b62c0d15cede40d66c1a7b7d091aaf868fbb3651ce2bb6cb5
                                                        • Opcode Fuzzy Hash: ccbbfcb5371e837972e8c8d76d991653b60477d6ae3f318ccb5ec5b1e113a226
                                                        • Instruction Fuzzy Hash: 515190B5A44209AB8B14EB22CD82DBD73A1EF48770F604157E487A72D1DA35DD42FB43
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                        • API String ID: 1038674560-86951937
                                                        • Opcode ID: 8c7ff98f2a6ed37f0b5fcc6dc8e9e7d75ae4d291e231b2aaaca11ac268de2ab6
                                                        • Instruction ID: 51636642f1f08f029c2ba03d87cafc5aa8742f4fd1cd291ea873586be6dde8d1
                                                        • Opcode Fuzzy Hash: 8c7ff98f2a6ed37f0b5fcc6dc8e9e7d75ae4d291e231b2aaaca11ac268de2ab6
                                                        • Instruction Fuzzy Hash: E88107B1640219AACF20AB60DC52FBF3BA8EF05750F046026FD457B2D2EB71DA46E251
                                                        APIs
                                                        • GetSysColor.USER32(00000012), ref: 00F5A903
                                                        • SetTextColor.GDI32(?,?), ref: 00F5A907
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00F5A91D
                                                        • GetSysColor.USER32(0000000F), ref: 00F5A928
                                                        • CreateSolidBrush.GDI32(?), ref: 00F5A92D
                                                        • GetSysColor.USER32(00000011), ref: 00F5A945
                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F5A953
                                                        • SelectObject.GDI32(?,00000000), ref: 00F5A964
                                                        • SetBkColor.GDI32(?,00000000), ref: 00F5A96D
                                                        • SelectObject.GDI32(?,?), ref: 00F5A97A
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 00F5A999
                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F5A9B0
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00F5A9C5
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F5A9ED
                                                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00F5AA14
                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00F5AA32
                                                        • DrawFocusRect.USER32(?,?), ref: 00F5AA3D
                                                        • GetSysColor.USER32(00000011), ref: 00F5AA4B
                                                        • SetTextColor.GDI32(?,00000000), ref: 00F5AA53
                                                        • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00F5AA67
                                                        • SelectObject.GDI32(?,00F5A5FA), ref: 00F5AA7E
                                                        • DeleteObject.GDI32(?), ref: 00F5AA89
                                                        • SelectObject.GDI32(?,?), ref: 00F5AA8F
                                                        • DeleteObject.GDI32(?), ref: 00F5AA94
                                                        • SetTextColor.GDI32(?,?), ref: 00F5AA9A
                                                        • SetBkColor.GDI32(?,?), ref: 00F5AAA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 1996641542-0
                                                        • Opcode ID: 95c15a89dd9e9d83e0832d487901dfae72c92baf045858c8d7842d2de4e63356
                                                        • Instruction ID: e37e7a08b51009787c210c0d1c6ca4acb2861d06fa4f9aa7f9789321cdcbc3dc
                                                        • Opcode Fuzzy Hash: 95c15a89dd9e9d83e0832d487901dfae72c92baf045858c8d7842d2de4e63356
                                                        • Instruction Fuzzy Hash: 6F516C71800618EFDF109FA4DC48EAE7BB9FF08322F154265FA11AB2A1D7719954EF90
                                                        APIs
                                                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00F58AC1
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F58AD2
                                                        • CharNextW.USER32(0000014E), ref: 00F58B01
                                                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00F58B42
                                                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00F58B58
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F58B69
                                                        • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00F58B86
                                                        • SetWindowTextW.USER32(?,0000014E), ref: 00F58BD8
                                                        • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00F58BEE
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F58C1F
                                                        • _memset.LIBCMT ref: 00F58C44
                                                        • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00F58C8D
                                                        • _memset.LIBCMT ref: 00F58CEC
                                                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00F58D16
                                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 00F58D6E
                                                        • SendMessageW.USER32(?,0000133D,?,?), ref: 00F58E1B
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00F58E3D
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00F58E87
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00F58EB4
                                                        • DrawMenuBar.USER32(?), ref: 00F58EC3
                                                        • SetWindowTextW.USER32(?,0000014E), ref: 00F58EEB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                        • String ID: 0
                                                        • API String ID: 1073566785-4108050209
                                                        • Opcode ID: 141f117c43dcb53337b6dd63f590b991c37c4b9d391f7123be87658980f7e952
                                                        • Instruction ID: 09843a742c9766f547d53ac88c7be10267275bb14f848bfbd508572cf8bf929e
                                                        • Opcode Fuzzy Hash: 141f117c43dcb53337b6dd63f590b991c37c4b9d391f7123be87658980f7e952
                                                        • Instruction Fuzzy Hash: 4CE15171900208EBDB119F50CC84EEE7BB9EF09761F108156FE15BA191DB748A8AEF61
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00F549CA
                                                        • GetDesktopWindow.USER32 ref: 00F549DF
                                                        • GetWindowRect.USER32(00000000), ref: 00F549E6
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00F54A48
                                                        • DestroyWindow.USER32(?), ref: 00F54A74
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00F54A9D
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F54ABB
                                                        • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00F54AE1
                                                        • SendMessageW.USER32(?,00000421,?,?), ref: 00F54AF6
                                                        • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00F54B09
                                                        • IsWindowVisible.USER32(?), ref: 00F54B29
                                                        • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00F54B44
                                                        • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00F54B58
                                                        • GetWindowRect.USER32(?,?), ref: 00F54B70
                                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 00F54B96
                                                        • GetMonitorInfoW.USER32(00000000,?), ref: 00F54BB0
                                                        • CopyRect.USER32(?,?), ref: 00F54BC7
                                                        • SendMessageW.USER32(?,00000412,00000000), ref: 00F54C32
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                        • String ID: ($0$tooltips_class32
                                                        • API String ID: 698492251-4156429822
                                                        • Opcode ID: 860f2798ec989d7150b347101c543fbbb3e5ba716e7e14a4f870bff18f0f9177
                                                        • Instruction ID: 24a5e9bd9dfd4197e4a8a6675a12668eee49440f5556abe9b1b944a851f0df1c
                                                        • Opcode Fuzzy Hash: 860f2798ec989d7150b347101c543fbbb3e5ba716e7e14a4f870bff18f0f9177
                                                        • Instruction Fuzzy Hash: BDB1BD71604340AFDB04DF64C849B6ABBE4FF88315F00891DFA99AB2A1D770EC49DB95
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00ED28BC
                                                        • GetSystemMetrics.USER32(00000007), ref: 00ED28C4
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00ED28EF
                                                        • GetSystemMetrics.USER32(00000008), ref: 00ED28F7
                                                        • GetSystemMetrics.USER32(00000004), ref: 00ED291C
                                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00ED2939
                                                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00ED2949
                                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00ED297C
                                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00ED2990
                                                        • GetClientRect.USER32(00000000,000000FF), ref: 00ED29AE
                                                        • GetStockObject.GDI32(00000011), ref: 00ED29CA
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 00ED29D5
                                                          • Part of subcall function 00ED2344: GetCursorPos.USER32(?), ref: 00ED2357
                                                          • Part of subcall function 00ED2344: ScreenToClient.USER32(00F957B0,?), ref: 00ED2374
                                                          • Part of subcall function 00ED2344: GetAsyncKeyState.USER32(00000001), ref: 00ED2399
                                                          • Part of subcall function 00ED2344: GetAsyncKeyState.USER32(00000002), ref: 00ED23A7
                                                        • SetTimer.USER32(00000000,00000000,00000028,00ED1256), ref: 00ED29FC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                        • String ID: AutoIt v3 GUI
                                                        • API String ID: 1458621304-248962490
                                                        • Opcode ID: 0cffbf61b1f6b2534c5a7b17f5386a975a4987bebcad1865dba7836dca84c0cc
                                                        • Instruction ID: 8abd7512aa76764d0759d64d2bbb31f0bf1a14112497f1f4d75e37850e6b2c01
                                                        • Opcode Fuzzy Hash: 0cffbf61b1f6b2534c5a7b17f5386a975a4987bebcad1865dba7836dca84c0cc
                                                        • Instruction Fuzzy Hash: D3B18D71A0020AEFDB15DFA8DC45BAE7BB4FB18711F10422AFA15E72E0DB749841EB50
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                                                        • String ID: {n${n
                                                        • API String ID: 884005220-1873021148
                                                        • Opcode ID: d1f54f43c2e65488c7fd0fc4e73b835869e22d3995ac28741120e0afdc1e4dba
                                                        • Instruction ID: 98161f1d27803cdaac4c8e0fb5f1ed2c1aca7d55eaf92bf7d8b93b65dfd9ad2e
                                                        • Opcode Fuzzy Hash: d1f54f43c2e65488c7fd0fc4e73b835869e22d3995ac28741120e0afdc1e4dba
                                                        • Instruction Fuzzy Hash: 2C61E472E00309EFDB119F64DD0277A77A4EF00771F21511AE901AB1E1EB799941F792
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00F2A47A
                                                        • __swprintf.LIBCMT ref: 00F2A51B
                                                        • _wcscmp.LIBCMT ref: 00F2A52E
                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00F2A583
                                                        • _wcscmp.LIBCMT ref: 00F2A5BF
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00F2A5F6
                                                        • GetDlgCtrlID.USER32(?), ref: 00F2A648
                                                        • GetWindowRect.USER32(?,?), ref: 00F2A67E
                                                        • GetParent.USER32(?), ref: 00F2A69C
                                                        • ScreenToClient.USER32(00000000), ref: 00F2A6A3
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00F2A71D
                                                        • _wcscmp.LIBCMT ref: 00F2A731
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00F2A757
                                                        • _wcscmp.LIBCMT ref: 00F2A76B
                                                          • Part of subcall function 00EF362C: _iswctype.LIBCMT ref: 00EF3634
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                                                        • String ID: %s%u
                                                        • API String ID: 3744389584-679674701
                                                        • Opcode ID: 2ca2e545bdc47e9b8cfe8db89c625f1805b8a25828a3c0d5931641eb31f746ab
                                                        • Instruction ID: 6ab719b3486bf431f1caeea862001902d0cbe1c14f360090f297abf6a78bf40f
                                                        • Opcode Fuzzy Hash: 2ca2e545bdc47e9b8cfe8db89c625f1805b8a25828a3c0d5931641eb31f746ab
                                                        • Instruction Fuzzy Hash: B9A10271604726BFC714DF60D884FAAB7E8FF44320F008529FA99D6190EB30E955DB92
                                                        APIs
                                                        • GetClassNameW.USER32(00000008,?,00000400), ref: 00F2AF18
                                                        • _wcscmp.LIBCMT ref: 00F2AF29
                                                        • GetWindowTextW.USER32(00000001,?,00000400), ref: 00F2AF51
                                                        • CharUpperBuffW.USER32(?,00000000), ref: 00F2AF6E
                                                        • _wcscmp.LIBCMT ref: 00F2AF8C
                                                        • _wcsstr.LIBCMT ref: 00F2AF9D
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00F2AFD5
                                                        • _wcscmp.LIBCMT ref: 00F2AFE5
                                                        • GetWindowTextW.USER32(00000002,?,00000400), ref: 00F2B00C
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00F2B055
                                                        • _wcscmp.LIBCMT ref: 00F2B065
                                                        • GetClassNameW.USER32(00000010,?,00000400), ref: 00F2B08D
                                                        • GetWindowRect.USER32(00000004,?), ref: 00F2B0F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                        • String ID: @$ThumbnailClass
                                                        • API String ID: 1788623398-1539354611
                                                        • Opcode ID: 6818b992fbda245e0ea3bca87ed00eee8aea7ee8c5a7c1b37d1fc57f43d4b778
                                                        • Instruction ID: 85ba45b01cd97f79a53ac7e4aa2312893c2f4f5f1221cf11df72907c3e030424
                                                        • Opcode Fuzzy Hash: 6818b992fbda245e0ea3bca87ed00eee8aea7ee8c5a7c1b37d1fc57f43d4b778
                                                        • Instruction Fuzzy Hash: 4A81D1714083199FDB01DF10E985FAA77E8FF84324F04846AFD859A096DB34DD49EB62
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                        • API String ID: 1038674560-1810252412
                                                        • Opcode ID: a2871f6db4bbe08c7227b62082ee0cc390f85aba48d31fcd79a0fa569e6e5a1c
                                                        • Instruction ID: 7a6b08ea88d0acf7f0986e483e66cb3f0a0c78fc4e50d7499a79c4b9fe062c57
                                                        • Opcode Fuzzy Hash: a2871f6db4bbe08c7227b62082ee0cc390f85aba48d31fcd79a0fa569e6e5a1c
                                                        • Instruction Fuzzy Hash: 8A31A131988319ABDB04FB60EE43FEE77A49B10760F30101AB451711E1FB65EF04A652
                                                        APIs
                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00F45013
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00F4501E
                                                        • LoadCursorW.USER32(00000000,00007F03), ref: 00F45029
                                                        • LoadCursorW.USER32(00000000,00007F8B), ref: 00F45034
                                                        • LoadCursorW.USER32(00000000,00007F01), ref: 00F4503F
                                                        • LoadCursorW.USER32(00000000,00007F81), ref: 00F4504A
                                                        • LoadCursorW.USER32(00000000,00007F88), ref: 00F45055
                                                        • LoadCursorW.USER32(00000000,00007F80), ref: 00F45060
                                                        • LoadCursorW.USER32(00000000,00007F86), ref: 00F4506B
                                                        • LoadCursorW.USER32(00000000,00007F83), ref: 00F45076
                                                        • LoadCursorW.USER32(00000000,00007F85), ref: 00F45081
                                                        • LoadCursorW.USER32(00000000,00007F82), ref: 00F4508C
                                                        • LoadCursorW.USER32(00000000,00007F84), ref: 00F45097
                                                        • LoadCursorW.USER32(00000000,00007F04), ref: 00F450A2
                                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00F450AD
                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00F450B8
                                                        • GetCursorInfo.USER32(?), ref: 00F450C8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Cursor$Load$Info
                                                        • String ID:
                                                        • API String ID: 2577412497-0
                                                        • Opcode ID: 038a6928a623390c8153a5f8ec75cf56e7c9b529f063660c2faa7abfb6162f7e
                                                        • Instruction ID: c201e9b63a770e3e4bf06fd62b0bbb55e314f8e0e2786a5a008cf269ac8f63ff
                                                        • Opcode Fuzzy Hash: 038a6928a623390c8153a5f8ec75cf56e7c9b529f063660c2faa7abfb6162f7e
                                                        • Instruction Fuzzy Hash: 1131F4B1D4831E6BDF109FB68C8995FBFE8FF08750F50452AA50DE7281DA78A5009F91
                                                        APIs
                                                        • _memset.LIBCMT ref: 00F5A259
                                                        • DestroyWindow.USER32(?,?), ref: 00F5A2D3
                                                          • Part of subcall function 00ED7BCC: _memmove.LIBCMT ref: 00ED7C06
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00F5A34D
                                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00F5A36F
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F5A382
                                                        • DestroyWindow.USER32(00000000), ref: 00F5A3A4
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00ED0000,00000000), ref: 00F5A3DB
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F5A3F4
                                                        • GetDesktopWindow.USER32 ref: 00F5A40D
                                                        • GetWindowRect.USER32(00000000), ref: 00F5A414
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00F5A42C
                                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00F5A444
                                                          • Part of subcall function 00ED25DB: GetWindowLongW.USER32(?,000000EB), ref: 00ED25EC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                                                        • String ID: 0$tooltips_class32
                                                        • API String ID: 1297703922-3619404913
                                                        • Opcode ID: 8314df981ca7ed61b4591a89a9a8611f84f9473fcfdeb836a61d9437b4f71fb1
                                                        • Instruction ID: 5fb2c3f68cd7d0f05df6168742359b9dc4adf2f4a26456e6be2bbd773b4d0c90
                                                        • Opcode Fuzzy Hash: 8314df981ca7ed61b4591a89a9a8611f84f9473fcfdeb836a61d9437b4f71fb1
                                                        • Instruction Fuzzy Hash: E371CE70540708AFD721CF28CC49F6A7BE5FB88715F04462DFA85872A0D771E91AEB52
                                                        APIs
                                                          • Part of subcall function 00ED2612: GetWindowLongW.USER32(?,000000EB), ref: 00ED2623
                                                        • DragQueryPoint.SHELL32(?,?), ref: 00F5C627
                                                          • Part of subcall function 00F5AB37: ClientToScreen.USER32(?,?), ref: 00F5AB60
                                                          • Part of subcall function 00F5AB37: GetWindowRect.USER32(?,?), ref: 00F5ABD6
                                                          • Part of subcall function 00F5AB37: PtInRect.USER32(?,?,00F5C014), ref: 00F5ABE6
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00F5C690
                                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00F5C69B
                                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00F5C6BE
                                                        • _wcscat.LIBCMT ref: 00F5C6EE
                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00F5C705
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00F5C71E
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00F5C735
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00F5C757
                                                        • DragFinish.SHELL32(?), ref: 00F5C75E
                                                        • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00F5C851
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                        • API String ID: 169749273-3440237614
                                                        • Opcode ID: 66b77c436a9bd018de94b67362487fd58dfe5a5fad153fd4b44c8afb2cc88ab6
                                                        • Instruction ID: 9f52bee595db24767585e51c8400fbd5e1695dacb4e820bea4ac2f0745eed3c3
                                                        • Opcode Fuzzy Hash: 66b77c436a9bd018de94b67362487fd58dfe5a5fad153fd4b44c8afb2cc88ab6
                                                        • Instruction Fuzzy Hash: 0B617F71108305AFC701EF64CC85DAFBBF8EF89751F00092EF695922A1DB719A49DB92
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 00F54424
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F5446F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: BuffCharMessageSendUpper
                                                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                        • API String ID: 3974292440-4258414348
                                                        • Opcode ID: b759784b6fc916e3d55d09a6f45116851f18c89a437a3618edd2ec840cd71774
                                                        • Instruction ID: ec2d98be13ab7c0ca31af7ee09a1a096cfb1d10b134a9dddbadb03b7a7df9165
                                                        • Opcode Fuzzy Hash: b759784b6fc916e3d55d09a6f45116851f18c89a437a3618edd2ec840cd71774
                                                        • Instruction Fuzzy Hash: 1F918A356047018BCB08EF10C851A6EB7E1AF85754F0448A9FD926B3A3CB34EC4AEB81
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00F5B8B4
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00F56B11,?), ref: 00F5B910
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F5B949
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00F5B98C
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F5B9C3
                                                        • FreeLibrary.KERNEL32(?), ref: 00F5B9CF
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00F5B9DF
                                                        • DestroyIcon.USER32(?), ref: 00F5B9EE
                                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00F5BA0B
                                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00F5BA17
                                                          • Part of subcall function 00EF2EFD: __wcsicmp_l.LIBCMT ref: 00EF2F86
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                        • String ID: .dll$.exe$.icl
                                                        • API String ID: 1212759294-1154884017
                                                        • Opcode ID: e919103f6db9cf4c8931302223f6036ba1f71b65e380cd9c6c2e8bb7267efa3c
                                                        • Instruction ID: 7446a3b7abd34b33eecb2b1c6b4ec8b8e6f98fe713b3dea2a13ecc0a4ae52cf7
                                                        • Opcode Fuzzy Hash: e919103f6db9cf4c8931302223f6036ba1f71b65e380cd9c6c2e8bb7267efa3c
                                                        • Instruction Fuzzy Hash: B361D071900219BAEB14DF64DC45FBE7BA8FB08722F10411AFF15E61C1DB749989EBA0
                                                        APIs
                                                          • Part of subcall function 00ED9837: __itow.LIBCMT ref: 00ED9862
                                                          • Part of subcall function 00ED9837: __swprintf.LIBCMT ref: 00ED98AC
                                                        • CharLowerBuffW.USER32(?,?), ref: 00F3A3CB
                                                        • GetDriveTypeW.KERNEL32 ref: 00F3A418
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F3A460
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F3A497
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F3A4C5
                                                          • Part of subcall function 00ED7BCC: _memmove.LIBCMT ref: 00ED7C06
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                        • API String ID: 2698844021-4113822522
                                                        • Opcode ID: b6c7fe63a0f005acc00086f6dd52f5c25e0ae66090811ba3147485509596c0d1
                                                        • Instruction ID: 0e4c8606c0df72a427c879b6adbbcd01bdce321cef7885696f85849c60fe5710
                                                        • Opcode Fuzzy Hash: b6c7fe63a0f005acc00086f6dd52f5c25e0ae66090811ba3147485509596c0d1
                                                        • Instruction Fuzzy Hash: 7E516E715043059FC704EF21C99186AB3F4EF88768F40886EF89667362DB31ED0ADB52
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,00F0E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 00F2F8DF
                                                        • LoadStringW.USER32(00000000,?,00F0E029,00000001), ref: 00F2F8E8
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                        • GetModuleHandleW.KERNEL32(00000000,00F95310,?,00000FFF,?,?,00F0E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 00F2F90A
                                                        • LoadStringW.USER32(00000000,?,00F0E029,00000001), ref: 00F2F90D
                                                        • __swprintf.LIBCMT ref: 00F2F95D
                                                        • __swprintf.LIBCMT ref: 00F2F96E
                                                        • _wprintf.LIBCMT ref: 00F2FA17
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00F2FA2E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                        • API String ID: 984253442-2268648507
                                                        • Opcode ID: 40cd428a03af35ecbd2bbd67b0595d2bfe5010137dc11057318b02bad198f253
                                                        • Instruction ID: 1fe7d6aecd3f02c99e0617c3d36a16ec99681597721c29b469231b057499814a
                                                        • Opcode Fuzzy Hash: 40cd428a03af35ecbd2bbd67b0595d2bfe5010137dc11057318b02bad198f253
                                                        • Instruction Fuzzy Hash: 0A41617280421DAACF04FBE0DD56DEEB7B9EF18340F500066B505B2192EE355F4ADB61
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00F5BA56
                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 00F5BA6D
                                                        • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00F5BA78
                                                        • CloseHandle.KERNEL32(00000000), ref: 00F5BA85
                                                        • GlobalLock.KERNEL32(00000000), ref: 00F5BA8E
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00F5BA9D
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00F5BAA6
                                                        • CloseHandle.KERNEL32(00000000), ref: 00F5BAAD
                                                        • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00F5BABE
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,00F62CAC,?), ref: 00F5BAD7
                                                        • GlobalFree.KERNEL32(00000000), ref: 00F5BAE7
                                                        • GetObjectW.GDI32(?,00000018,000000FF), ref: 00F5BB0B
                                                        • CopyImage.USER32(?,00000000,?,?,00002000), ref: 00F5BB36
                                                        • DeleteObject.GDI32(00000000), ref: 00F5BB5E
                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00F5BB74
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                        • String ID:
                                                        • API String ID: 3840717409-0
                                                        • Opcode ID: 93ca13e0f72c43f5ceda1f866141e9dd1048156adfe8b3af568e9f5b43fdc06c
                                                        • Instruction ID: 1506395404ee39b2fab873e1d1fa92c05ceb88b613274f7f31a5f4bf8eac6248
                                                        • Opcode Fuzzy Hash: 93ca13e0f72c43f5ceda1f866141e9dd1048156adfe8b3af568e9f5b43fdc06c
                                                        • Instruction Fuzzy Hash: A741FA75900208FFDB119F65DC48EABBBB9EB89722F1040A8FA05D7260D7749945EB60
                                                        APIs
                                                        • __wsplitpath.LIBCMT ref: 00F3DA10
                                                        • _wcscat.LIBCMT ref: 00F3DA28
                                                        • _wcscat.LIBCMT ref: 00F3DA3A
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F3DA4F
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F3DA63
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00F3DA7B
                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00F3DA95
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00F3DAA7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                        • String ID: *.*
                                                        • API String ID: 34673085-438819550
                                                        • Opcode ID: d7d4309a1e294d0ea0bc8da16402ced793b3091ed11d9b99f3808a5bb87d7e3e
                                                        • Instruction ID: 7d109233c77e670717e1138087f611215e01a67da03624918457a3d5a2b2b3b8
                                                        • Opcode Fuzzy Hash: d7d4309a1e294d0ea0bc8da16402ced793b3091ed11d9b99f3808a5bb87d7e3e
                                                        • Instruction Fuzzy Hash: AD81B1729043449FCB24EF64D840AAAB7E8FF89734F14482EF889D7251E734E945EB52
                                                        APIs
                                                          • Part of subcall function 00ED2612: GetWindowLongW.USER32(?,000000EB), ref: 00ED2623
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00F5C1FC
                                                        • GetFocus.USER32 ref: 00F5C20C
                                                        • GetDlgCtrlID.USER32(00000000), ref: 00F5C217
                                                        • _memset.LIBCMT ref: 00F5C342
                                                        • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00F5C36D
                                                        • GetMenuItemCount.USER32(?), ref: 00F5C38D
                                                        • GetMenuItemID.USER32(?,00000000), ref: 00F5C3A0
                                                        • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00F5C3D4
                                                        • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00F5C41C
                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00F5C454
                                                        • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00F5C489
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                        • String ID: 0
                                                        • API String ID: 1296962147-4108050209
                                                        • Opcode ID: 12da6e8d5ddd8076b9b395895fa5f3578c539468b9a0ab8ddccb395242bcede9
                                                        • Instruction ID: 33788c27bf700064a3005e1a5603ac4c1903b380a3e13525d7355d51270d5c45
                                                        • Opcode Fuzzy Hash: 12da6e8d5ddd8076b9b395895fa5f3578c539468b9a0ab8ddccb395242bcede9
                                                        • Instruction Fuzzy Hash: 07818C716083059FDB11CF14C894E6BBBE8FB88725F00492EFE9697291D770D909EB92
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00F4738F
                                                        • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00F4739B
                                                        • CreateCompatibleDC.GDI32(?), ref: 00F473A7
                                                        • SelectObject.GDI32(00000000,?), ref: 00F473B4
                                                        • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00F47408
                                                        • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00F47444
                                                        • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00F47468
                                                        • SelectObject.GDI32(00000006,?), ref: 00F47470
                                                        • DeleteObject.GDI32(?), ref: 00F47479
                                                        • DeleteDC.GDI32(00000006), ref: 00F47480
                                                        • ReleaseDC.USER32(00000000,?), ref: 00F4748B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                        • String ID: (
                                                        • API String ID: 2598888154-3887548279
                                                        • Opcode ID: f4d03be1f5c944fe1301354921230a524ec003944d04171ac0cbe8c55ed7cbf4
                                                        • Instruction ID: 78bc1643104a48eea15e6f0e6579f61396df4555e9e5bab6f35b429f58e551a7
                                                        • Opcode Fuzzy Hash: f4d03be1f5c944fe1301354921230a524ec003944d04171ac0cbe8c55ed7cbf4
                                                        • Instruction Fuzzy Hash: 39514772904309EFCB14DFA8CC84EAEBBB9EF48310F148469FA5AA7251C731A9449B50
                                                        APIs
                                                          • Part of subcall function 00EF0957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00ED6B0C,?,00008000), ref: 00EF0973
                                                          • Part of subcall function 00ED4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00ED4743,?,?,00ED37AE,?), ref: 00ED4770
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00ED6BAD
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00ED6CFA
                                                          • Part of subcall function 00ED586D: _wcscpy.LIBCMT ref: 00ED58A5
                                                          • Part of subcall function 00EF363D: _iswctype.LIBCMT ref: 00EF3645
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                                                        • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                        • API String ID: 537147316-1018226102
                                                        • Opcode ID: 50c2768dfdbbf99a614b219ccf74b0ead097be5adddd3ac63e469cb68472289a
                                                        • Instruction ID: 3bba64475bbdad70dea1da3f3ff8b265d0149680565ec719f1d8617119472609
                                                        • Opcode Fuzzy Hash: 50c2768dfdbbf99a614b219ccf74b0ead097be5adddd3ac63e469cb68472289a
                                                        • Instruction Fuzzy Hash: 0802BE715083409FC724EF24C881AAFBBE5EF95314F145C2EF495A72A2DB30D94AEB52
                                                        APIs
                                                        • _memset.LIBCMT ref: 00F32D50
                                                        • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00F32DDD
                                                        • GetMenuItemCount.USER32(00F95890), ref: 00F32E66
                                                        • DeleteMenu.USER32(00F95890,00000005,00000000,000000F5,?,?), ref: 00F32EF6
                                                        • DeleteMenu.USER32(00F95890,00000004,00000000), ref: 00F32EFE
                                                        • DeleteMenu.USER32(00F95890,00000006,00000000), ref: 00F32F06
                                                        • DeleteMenu.USER32(00F95890,00000003,00000000), ref: 00F32F0E
                                                        • GetMenuItemCount.USER32(00F95890), ref: 00F32F16
                                                        • SetMenuItemInfoW.USER32(00F95890,00000004,00000000,00000030), ref: 00F32F4C
                                                        • GetCursorPos.USER32(?), ref: 00F32F56
                                                        • SetForegroundWindow.USER32(00000000), ref: 00F32F5F
                                                        • TrackPopupMenuEx.USER32(00F95890,00000000,?,00000000,00000000,00000000), ref: 00F32F72
                                                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00F32F7E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                        • String ID:
                                                        • API String ID: 3993528054-0
                                                        • Opcode ID: 64f640a56b35af38440f7f32869b13caaefbb4894840617f88b49f54cf403f6c
                                                        • Instruction ID: a0ac584b532a2a482bb6bf1e07584642ef32664e32673fb9a0e4cb4b49be5487
                                                        • Opcode Fuzzy Hash: 64f640a56b35af38440f7f32869b13caaefbb4894840617f88b49f54cf403f6c
                                                        • Instruction Fuzzy Hash: 8271D571A00209BBEB619F64DC46FAABF64FF04734F144216F625AA1E1C771AC54FB90
                                                        APIs
                                                          • Part of subcall function 00ED7BCC: _memmove.LIBCMT ref: 00ED7C06
                                                        • _memset.LIBCMT ref: 00F2786B
                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00F278A0
                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00F278BC
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00F278D8
                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00F27902
                                                        • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00F2792A
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F27935
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F2793A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                        • API String ID: 1411258926-22481851
                                                        • Opcode ID: c9ba812d0b50ed6b1ef2f7e56b12836d60d6922d6ca8b9835976b999bb883964
                                                        • Instruction ID: 9e0bf4242da46cd40a191337f990141de79f5083e59d2b8ef4e7b4aa2430c98c
                                                        • Opcode Fuzzy Hash: c9ba812d0b50ed6b1ef2f7e56b12836d60d6922d6ca8b9835976b999bb883964
                                                        • Instruction Fuzzy Hash: 0641E772C1422DAACF11EBA4EC95DEEB7B8FF04310F44406AE955B72A1EA319D05DB90
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F4FDAD,?,?), ref: 00F50E31
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                        • API String ID: 3964851224-909552448
                                                        • Opcode ID: 5f6cadc23a880ad9212426862c7fe1efbdec088c9cfed0758d36305c296acf14
                                                        • Instruction ID: 92b2507a7c97c33f807d1e3a0d6dcf5f12b81b6a0ac6eef86cff9bd96fc5b578
                                                        • Opcode Fuzzy Hash: 5f6cadc23a880ad9212426862c7fe1efbdec088c9cfed0758d36305c296acf14
                                                        • Instruction Fuzzy Hash: B4419A3250464A8BCF20EF10D962AFE33A4EF11311F194455FE512B293DB709D1AEBA0
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00F0E2A0,00000010,?,Bad directive syntax error,00F5F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00F2F7C2
                                                        • LoadStringW.USER32(00000000,?,00F0E2A0,00000010), ref: 00F2F7C9
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                        • _wprintf.LIBCMT ref: 00F2F7FC
                                                        • __swprintf.LIBCMT ref: 00F2F81E
                                                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00F2F88D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                        • API String ID: 1506413516-4153970271
                                                        • Opcode ID: 324c11cfa3421596778ef8ec03413f14aef8e62f67eaed3c769e3e4f96f6ade6
                                                        • Instruction ID: 5e77f530dcd6f3cc5bbc144f890099583d173828b38f8e2f31a431dd7bd22039
                                                        • Opcode Fuzzy Hash: 324c11cfa3421596778ef8ec03413f14aef8e62f67eaed3c769e3e4f96f6ade6
                                                        • Instruction Fuzzy Hash: 57216D3291021EAFCF11EF90CC1AEEEB779FF18301F040466B655761A2EA319619EB51
                                                        APIs
                                                          • Part of subcall function 00ED7BCC: _memmove.LIBCMT ref: 00ED7C06
                                                          • Part of subcall function 00ED7924: _memmove.LIBCMT ref: 00ED79AD
                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00F35330
                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00F35346
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F35357
                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00F35369
                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00F3537A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: SendString$_memmove
                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                        • API String ID: 2279737902-1007645807
                                                        • Opcode ID: e1741ade3bd85fdc67da553df72dd1a5cb875b790ae1d1d3706c44cdf3247d71
                                                        • Instruction ID: 6a41459310bb9fd71772aa47e9e7934bbcb5dedc5084ef40a1029814fee43a3d
                                                        • Opcode Fuzzy Hash: e1741ade3bd85fdc67da553df72dd1a5cb875b790ae1d1d3706c44cdf3247d71
                                                        • Instruction Fuzzy Hash: B4118221A9022979D720B765CC5ADFFBBBCEBD5F90F80042AB451A21D1EEA04D06D6A1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                                                        • String ID: 0.0.0.0
                                                        • API String ID: 208665112-3771769585
                                                        • Opcode ID: dcdace4a1239d5114bd7170486f31d7c9b7540d20afa2a2f0a3b1246e105e5c7
                                                        • Instruction ID: c96af789b3336a500df0bc3e124a27f2420e2dd0c6a69fd65ed031b4fe5f2d85
                                                        • Opcode Fuzzy Hash: dcdace4a1239d5114bd7170486f31d7c9b7540d20afa2a2f0a3b1246e105e5c7
                                                        • Instruction Fuzzy Hash: 8C11D531900218ABCB14AB309C46EEA77BCEF02732F0441BAF645A6091EF71A985AA51
                                                        APIs
                                                        • timeGetTime.WINMM ref: 00F34F7A
                                                          • Part of subcall function 00EF049F: timeGetTime.WINMM(?,75C0B400,00EE0E7B), ref: 00EF04A3
                                                        • Sleep.KERNEL32(0000000A), ref: 00F34FA6
                                                        • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00F34FCA
                                                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00F34FEC
                                                        • SetActiveWindow.USER32 ref: 00F3500B
                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00F35019
                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 00F35038
                                                        • Sleep.KERNEL32(000000FA), ref: 00F35043
                                                        • IsWindow.USER32 ref: 00F3504F
                                                        • EndDialog.USER32(00000000), ref: 00F35060
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                        • String ID: BUTTON
                                                        • API String ID: 1194449130-3405671355
                                                        • Opcode ID: 3519a3b012e5b2690632ebd70df3038c18e62d9bbb6dca72bf6c959f83a73ee0
                                                        • Instruction ID: 9ea7943e55d69e9b2d7612a715775cc1fd8ad89c3a02c37fd6c94ac4242a2bdb
                                                        • Opcode Fuzzy Hash: 3519a3b012e5b2690632ebd70df3038c18e62d9bbb6dca72bf6c959f83a73ee0
                                                        • Instruction Fuzzy Hash: 8221A17060070DAFE7215F30EC89B2A3B69EB46B66F0E1025F601C21B5DB729D04BB62
                                                        APIs
                                                          • Part of subcall function 00ED9837: __itow.LIBCMT ref: 00ED9862
                                                          • Part of subcall function 00ED9837: __swprintf.LIBCMT ref: 00ED98AC
                                                        • CoInitialize.OLE32(00000000), ref: 00F3D5EA
                                                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00F3D67D
                                                        • SHGetDesktopFolder.SHELL32(?), ref: 00F3D691
                                                        • CoCreateInstance.OLE32(00F62D7C,00000000,00000001,00F88C1C,?), ref: 00F3D6DD
                                                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00F3D74C
                                                        • CoTaskMemFree.OLE32(?,?), ref: 00F3D7A4
                                                        • _memset.LIBCMT ref: 00F3D7E1
                                                        • SHBrowseForFolderW.SHELL32(?), ref: 00F3D81D
                                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00F3D840
                                                        • CoTaskMemFree.OLE32(00000000), ref: 00F3D847
                                                        • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00F3D87E
                                                        • CoUninitialize.OLE32(00000001,00000000), ref: 00F3D880
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                        • String ID:
                                                        • API String ID: 1246142700-0
                                                        • Opcode ID: d3c03c19ac97852e974e2a5679a2c92258890e8bcf78c967ba12cdb47982b697
                                                        • Instruction ID: c893839b5ff86a94e291d93c35dc02fe64dcab3d252f33fd4d8e0a5a37416315
                                                        • Opcode Fuzzy Hash: d3c03c19ac97852e974e2a5679a2c92258890e8bcf78c967ba12cdb47982b697
                                                        • Instruction Fuzzy Hash: 3DB1FA75A00209AFDB04DFA4D885DAEBBF9FF48314F1484A9E909EB261DB30ED45DB50
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000001), ref: 00F2C283
                                                        • GetWindowRect.USER32(00000000,?), ref: 00F2C295
                                                        • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00F2C2F3
                                                        • GetDlgItem.USER32(?,00000002), ref: 00F2C2FE
                                                        • GetWindowRect.USER32(00000000,?), ref: 00F2C310
                                                        • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00F2C364
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00F2C372
                                                        • GetWindowRect.USER32(00000000,?), ref: 00F2C383
                                                        • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00F2C3C6
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00F2C3D4
                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00F2C3F1
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00F2C3FE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                        • String ID:
                                                        • API String ID: 3096461208-0
                                                        • Opcode ID: d1d74614409854818ca6ac9b4a8f30a306eb1338490fb37d8ace9e9788101579
                                                        • Instruction ID: ae96f78791427a1ef58bbfaf8f76607bb4687f922ea4fffeb9b62d18cf9a75e9
                                                        • Opcode Fuzzy Hash: d1d74614409854818ca6ac9b4a8f30a306eb1338490fb37d8ace9e9788101579
                                                        • Instruction Fuzzy Hash: A9519071F00309AFDB08CFA8DD89AAEBBBAEB88311F14856DF605D7290D7709D049B50
                                                        APIs
                                                          • Part of subcall function 00ED1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00ED2036,?,00000000,?,?,?,?,00ED16CB,00000000,?), ref: 00ED1B9A
                                                        • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00ED20D3
                                                        • KillTimer.USER32(-00000001,?,?,?,?,00ED16CB,00000000,?,?,00ED1AE2,?,?), ref: 00ED216E
                                                        • DestroyAcceleratorTable.USER32(00000000), ref: 00F0BCA6
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00ED16CB,00000000,?,?,00ED1AE2,?,?), ref: 00F0BCD7
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00ED16CB,00000000,?,?,00ED1AE2,?,?), ref: 00F0BCEE
                                                        • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00ED16CB,00000000,?,?,00ED1AE2,?,?), ref: 00F0BD0A
                                                        • DeleteObject.GDI32(00000000), ref: 00F0BD1C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                        • String ID:
                                                        • API String ID: 641708696-0
                                                        • Opcode ID: d0888eb38808eff462d790f4dd7b17263c9a629fdc560134db129364d451484f
                                                        • Instruction ID: e0a1be3edb58487fad441124e7e95ce76c16cb9912b3cd63828493c30ddd9371
                                                        • Opcode Fuzzy Hash: d0888eb38808eff462d790f4dd7b17263c9a629fdc560134db129364d451484f
                                                        • Instruction Fuzzy Hash: 6061AE30501B08DFDB36AF14D948B2AB7F1FF50716F10952EE642AA6B0C770A886FB50
                                                        APIs
                                                          • Part of subcall function 00ED25DB: GetWindowLongW.USER32(?,000000EB), ref: 00ED25EC
                                                        • GetSysColor.USER32(0000000F), ref: 00ED21D3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ColorLongWindow
                                                        • String ID:
                                                        • API String ID: 259745315-0
                                                        • Opcode ID: f0722e74b44ea3550ade8a860c4d7cd9099711cfe3cbfd3907421535cccfe07d
                                                        • Instruction ID: d9e745da3c7f3635ecca0e9f74d8e1ea779da000d69f8d2bb5f71af780a186a8
                                                        • Opcode Fuzzy Hash: f0722e74b44ea3550ade8a860c4d7cd9099711cfe3cbfd3907421535cccfe07d
                                                        • Instruction Fuzzy Hash: 0441A631404644DFDB255F68EC48BB93B65EB16331F1452AAFF659A2F1C7318C42EB21
                                                        APIs
                                                        • CharLowerBuffW.USER32(?,?,00F5F910), ref: 00F3A90B
                                                        • GetDriveTypeW.KERNEL32(00000061,00F889A0,00000061), ref: 00F3A9D5
                                                        • _wcscpy.LIBCMT ref: 00F3A9FF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: BuffCharDriveLowerType_wcscpy
                                                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                        • API String ID: 2820617543-1000479233
                                                        • Opcode ID: fd1ce588e8ec53c1800313c3eac428e33aab2d9287a452ccb65d9c6475682ff0
                                                        • Instruction ID: 120827703bbb9f89d19d93b82145586d5eb6a5b8e8b815d166989edf50e5af9f
                                                        • Opcode Fuzzy Hash: fd1ce588e8ec53c1800313c3eac428e33aab2d9287a452ccb65d9c6475682ff0
                                                        • Instruction Fuzzy Hash: 3D51AA325083019BC700EF15C992AAFB7E5EF84760F40586EF9D5A72A2DB31990ADB53
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __i64tow__itow__swprintf
                                                        • String ID: %.15g$0x%p$False$True
                                                        • API String ID: 421087845-2263619337
                                                        • Opcode ID: a6dd11e97172bb3b5c8566155d127f968e8e6a9e916875b258883b117097ff22
                                                        • Instruction ID: 29dd812d217ed42f66eacc83c1fe4de3ec1b0bc86d500a78fb6e12718fc5aec7
                                                        • Opcode Fuzzy Hash: a6dd11e97172bb3b5c8566155d127f968e8e6a9e916875b258883b117097ff22
                                                        • Instruction Fuzzy Hash: 2841E475900209AFDB28DF34DC42ABA73E9EF05710F24446EE549E7382EA32D906AB11
                                                        APIs
                                                        • _memset.LIBCMT ref: 00F5716A
                                                        • CreateMenu.USER32 ref: 00F57185
                                                        • SetMenu.USER32(?,00000000), ref: 00F57194
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F57221
                                                        • IsMenu.USER32(?), ref: 00F57237
                                                        • CreatePopupMenu.USER32 ref: 00F57241
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F5726E
                                                        • DrawMenuBar.USER32 ref: 00F57276
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                                                        • String ID: 0$F
                                                        • API String ID: 176399719-3044882817
                                                        • Opcode ID: 19e0701e874011640e895502e2d1544c1ae9e1f08fc14b0d9cf04f545d2a36fa
                                                        • Instruction ID: 7581dae208dc2257dca1cf3c1ece0b1a9c5b6ca9b25d5a9a6afef3cabc0754a1
                                                        • Opcode Fuzzy Hash: 19e0701e874011640e895502e2d1544c1ae9e1f08fc14b0d9cf04f545d2a36fa
                                                        • Instruction Fuzzy Hash: 50414675A01309AFDB20EF64E844E9ABBB5FB08351F144069FE05A7361D731A918EF90
                                                        APIs
                                                        • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00F5755E
                                                        • CreateCompatibleDC.GDI32(00000000), ref: 00F57565
                                                        • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00F57578
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00F57580
                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00F5758B
                                                        • DeleteDC.GDI32(00000000), ref: 00F57594
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00F5759E
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00F575B2
                                                        • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00F575BE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                        • String ID: static
                                                        • API String ID: 2559357485-2160076837
                                                        • Opcode ID: ae5129247d83e71aa3af98fb7111600689f9bc2707041645713229151b1f1427
                                                        • Instruction ID: 19e09516d7edf67073eb16908451c97ebe77ec012ff4dfc64588bee2db06d735
                                                        • Opcode Fuzzy Hash: ae5129247d83e71aa3af98fb7111600689f9bc2707041645713229151b1f1427
                                                        • Instruction Fuzzy Hash: A7316E72504218BBDF12AF64EC08FDB3F69EF09322F150265FB15961A0D735D819EBA4
                                                        APIs
                                                        • _memset.LIBCMT ref: 00EF6E3E
                                                          • Part of subcall function 00EF8B28: __getptd_noexit.LIBCMT ref: 00EF8B28
                                                        • __gmtime64_s.LIBCMT ref: 00EF6ED7
                                                        • __gmtime64_s.LIBCMT ref: 00EF6F0D
                                                        • __gmtime64_s.LIBCMT ref: 00EF6F2A
                                                        • __allrem.LIBCMT ref: 00EF6F80
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EF6F9C
                                                        • __allrem.LIBCMT ref: 00EF6FB3
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EF6FD1
                                                        • __allrem.LIBCMT ref: 00EF6FE8
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00EF7006
                                                        • __invoke_watson.LIBCMT ref: 00EF7077
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                        • String ID:
                                                        • API String ID: 384356119-0
                                                        • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                        • Instruction ID: c7bb0298edab578c7532a35a3cfd60aa979dbc00df7d370cb826b88d35998e91
                                                        • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                                                        • Instruction Fuzzy Hash: FE71E876A0071BABD714DE68DC41BBAB7E8AF04724F145229F654F72C1EB74EE009790
                                                        APIs
                                                        • _memset.LIBCMT ref: 00F32542
                                                        • GetMenuItemInfoW.USER32(00F95890,000000FF,00000000,00000030), ref: 00F325A3
                                                        • SetMenuItemInfoW.USER32(00F95890,00000004,00000000,00000030), ref: 00F325D9
                                                        • Sleep.KERNEL32(000001F4), ref: 00F325EB
                                                        • GetMenuItemCount.USER32(?), ref: 00F3262F
                                                        • GetMenuItemID.USER32(?,00000000), ref: 00F3264B
                                                        • GetMenuItemID.USER32(?,-00000001), ref: 00F32675
                                                        • GetMenuItemID.USER32(?,?), ref: 00F326BA
                                                        • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00F32700
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F32714
                                                        • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F32735
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                        • String ID:
                                                        • API String ID: 4176008265-0
                                                        • Opcode ID: 0ff8dcd23173b311c0507597e50454e8c8eadadacd62ff688cd30913029f8e89
                                                        • Instruction ID: 689ffdb43d55a6d840712d5d1e7c3ab93025ce82d9d2ad3d7af21a08ac1b9ec2
                                                        • Opcode Fuzzy Hash: 0ff8dcd23173b311c0507597e50454e8c8eadadacd62ff688cd30913029f8e89
                                                        • Instruction Fuzzy Hash: C3618DB1900249AFDF51CF64DC89EBE7BB8FF45324F180059E942A7251D731AE05EB21
                                                        APIs
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00F56FA5
                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00F56FA8
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00F56FCC
                                                        • _memset.LIBCMT ref: 00F56FDD
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00F56FEF
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00F57067
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow_memset
                                                        • String ID:
                                                        • API String ID: 830647256-0
                                                        • Opcode ID: bea6c1709f2858e54177900d6e00bde692c37829d0ef169a18062358172754f5
                                                        • Instruction ID: ae60550c8d6fdbbb3774bb410bb6403780471be255619a915a7c963e1186936f
                                                        • Opcode Fuzzy Hash: bea6c1709f2858e54177900d6e00bde692c37829d0ef169a18062358172754f5
                                                        • Instruction Fuzzy Hash: 91618C71900608AFDB11DFA4DC81EEE77F8EB08710F10019AFA14EB2A1D771AE45EB90
                                                        APIs
                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00F26BBF
                                                        • SafeArrayAllocData.OLEAUT32(?), ref: 00F26C18
                                                        • VariantInit.OLEAUT32(?), ref: 00F26C2A
                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 00F26C4A
                                                        • VariantCopy.OLEAUT32(?,?), ref: 00F26C9D
                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 00F26CB1
                                                        • VariantClear.OLEAUT32(?), ref: 00F26CC6
                                                        • SafeArrayDestroyData.OLEAUT32(?), ref: 00F26CD3
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F26CDC
                                                        • VariantClear.OLEAUT32(?), ref: 00F26CEE
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F26CF9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                        • String ID:
                                                        • API String ID: 2706829360-0
                                                        • Opcode ID: 966e7dba52c84f9deec5fb175b072cffb8f2ce543767f749ba39bcad522acca2
                                                        • Instruction ID: 8a0f383828d502b9de948c76b1ea1b1f8b1bc7d3d6c2793b9b93ba184e4800e8
                                                        • Opcode Fuzzy Hash: 966e7dba52c84f9deec5fb175b072cffb8f2ce543767f749ba39bcad522acca2
                                                        • Instruction Fuzzy Hash: 90415275A0022D9FCF04EFA4DC449AEBBB9EF48351F008069E955E7261CB31A945DB90
                                                        APIs
                                                        • WSAStartup.WSOCK32(00000101,?), ref: 00F45793
                                                        • inet_addr.WSOCK32(?), ref: 00F457D8
                                                        • gethostbyname.WSOCK32(?), ref: 00F457E4
                                                        • IcmpCreateFile.IPHLPAPI ref: 00F457F2
                                                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00F45862
                                                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00F45878
                                                        • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00F458ED
                                                        • WSACleanup.WSOCK32 ref: 00F458F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                        • String ID: Ping
                                                        • API String ID: 1028309954-2246546115
                                                        • Opcode ID: 92e778559ab4aa8bb0d8cb11af2679b71d1b36a4dab241333e0762fb87ff2275
                                                        • Instruction ID: 0d91d46aeea83d0535a8e7ea9f2cfc7a2ece79e2982beecd91e42aea081e3b9f
                                                        • Opcode Fuzzy Hash: 92e778559ab4aa8bb0d8cb11af2679b71d1b36a4dab241333e0762fb87ff2275
                                                        • Instruction Fuzzy Hash: F6515071A047009FDB10EF25DC45B6A7BE4EF48B20F04496AF956EB2A2DB70ED05EB41
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00F3B4D0
                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00F3B546
                                                        • GetLastError.KERNEL32 ref: 00F3B550
                                                        • SetErrorMode.KERNEL32(00000000,READY), ref: 00F3B5BD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                        • API String ID: 4194297153-14809454
                                                        • Opcode ID: 65eab9d3cc2162c29cb580c0cb1cd54bc046a38e8de760f5e887a69f3a1332f2
                                                        • Instruction ID: 8f276b47c5b5b09c85af773e8e621efc5ab0d54caa1f68a65b1368ca2976255f
                                                        • Opcode Fuzzy Hash: 65eab9d3cc2162c29cb580c0cb1cd54bc046a38e8de760f5e887a69f3a1332f2
                                                        • Instruction Fuzzy Hash: 7F318336A00209EFCB40EB68CC55AAD77B4FF84321F584166E605E7295DB70DA42EB51
                                                        APIs
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                          • Part of subcall function 00F2AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F2AABC
                                                        • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00F29014
                                                        • GetDlgCtrlID.USER32 ref: 00F2901F
                                                        • GetParent.USER32 ref: 00F2903B
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F2903E
                                                        • GetDlgCtrlID.USER32(?), ref: 00F29047
                                                        • GetParent.USER32(?), ref: 00F29063
                                                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00F29066
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 1536045017-1403004172
                                                        • Opcode ID: 68878c790b807ea13e12b612f87d897bc19abce7f4d6f8884c117c9d4170c0a4
                                                        • Instruction ID: 0e81c127f29fb159a1e5b0cef622e0a2d1927939c8d32aeda8ce4d1383dbe242
                                                        • Opcode Fuzzy Hash: 68878c790b807ea13e12b612f87d897bc19abce7f4d6f8884c117c9d4170c0a4
                                                        • Instruction Fuzzy Hash: 6621F871A00208BBDF04EBA4DC85EFEBBB5EF49310F100156F961972A1DB759819EB21
                                                        APIs
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                          • Part of subcall function 00F2AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F2AABC
                                                        • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00F290FD
                                                        • GetDlgCtrlID.USER32 ref: 00F29108
                                                        • GetParent.USER32 ref: 00F29124
                                                        • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F29127
                                                        • GetDlgCtrlID.USER32(?), ref: 00F29130
                                                        • GetParent.USER32(?), ref: 00F2914C
                                                        • SendMessageW.USER32(00000000,?,?,00000111), ref: 00F2914F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CtrlParent$ClassName_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 1536045017-1403004172
                                                        • Opcode ID: 12d865194cb20439e2d293d8474b50077918b653de0c75ddc4eeec969957f418
                                                        • Instruction ID: b3af426b3d7af6167d187d388df1a27f0c47b981c3ff51bc240cc605efda8df4
                                                        • Opcode Fuzzy Hash: 12d865194cb20439e2d293d8474b50077918b653de0c75ddc4eeec969957f418
                                                        • Instruction Fuzzy Hash: 9C210775E00208BBDF00ABA4DC85FFEBBB4EF44300F100056FA51A72A1DB798819EB20
                                                        APIs
                                                        • GetParent.USER32 ref: 00F2916F
                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 00F29184
                                                        • _wcscmp.LIBCMT ref: 00F29196
                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00F29211
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameParentSend_wcscmp
                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                        • API String ID: 1704125052-3381328864
                                                        • Opcode ID: 14fb1b3e3307c811b9f7e1aad3796d02a0afd832e6d731cabe03c159bc5aa7b9
                                                        • Instruction ID: 84ec8e06d150c51cd27edc5c825b80588ac8b76ef471f53eae37d53b66741933
                                                        • Opcode Fuzzy Hash: 14fb1b3e3307c811b9f7e1aad3796d02a0afd832e6d731cabe03c159bc5aa7b9
                                                        • Instruction Fuzzy Hash: B011E73664C31BB9EA113664FC0AEB737DC9B15730F30006AFB10E60D2FEA1A8517695
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00F488D7
                                                        • CoInitialize.OLE32(00000000), ref: 00F48904
                                                        • CoUninitialize.OLE32 ref: 00F4890E
                                                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00F48A0E
                                                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00F48B3B
                                                        • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00F62C0C), ref: 00F48B6F
                                                        • CoGetObject.OLE32(?,00000000,00F62C0C,?), ref: 00F48B92
                                                        • SetErrorMode.KERNEL32(00000000), ref: 00F48BA5
                                                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00F48C25
                                                        • VariantClear.OLEAUT32(?), ref: 00F48C35
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                        • String ID:
                                                        • API String ID: 2395222682-0
                                                        • Opcode ID: 6a10b0db0134c5935f98d01bb25411130ecdd4b86877c44de9829d1b73af2f41
                                                        • Instruction ID: eb84929b0ee79a23dac9962dbd3ce14c236fd5fe875387c497cfdc3c3be37c84
                                                        • Opcode Fuzzy Hash: 6a10b0db0134c5935f98d01bb25411130ecdd4b86877c44de9829d1b73af2f41
                                                        • Instruction Fuzzy Hash: ECC115B1608305AFC700EF64C88492BBBE9FF89798F00495DF9899B251DB71ED06DB52
                                                        APIs
                                                        • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00F37A6C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ArraySafeVartype
                                                        • String ID:
                                                        • API String ID: 1725837607-0
                                                        • Opcode ID: 8dc37d0b5316e2dc4973773bc042c4e173028afdd121f79b0544fc4463c8141b
                                                        • Instruction ID: 73e2e44dab5b17db8d0a92d66641ba662693cbb2c3511ba127bb857f0bc52a9e
                                                        • Opcode Fuzzy Hash: 8dc37d0b5316e2dc4973773bc042c4e173028afdd121f79b0544fc4463c8141b
                                                        • Instruction Fuzzy Hash: D8B15DB190831A9FDB20EF94C885BBEB7F4EF49331F245469E601E7251D734A941EBA0
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 00F311F0
                                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00F30268,?,00000001), ref: 00F31204
                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 00F3120B
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F30268,?,00000001), ref: 00F3121A
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F3122C
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F30268,?,00000001), ref: 00F31245
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F30268,?,00000001), ref: 00F31257
                                                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00F30268,?,00000001), ref: 00F3129C
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00F30268,?,00000001), ref: 00F312B1
                                                        • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00F30268,?,00000001), ref: 00F312BC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                        • String ID:
                                                        • API String ID: 2156557900-0
                                                        • Opcode ID: e609a8aed0e15d6b0ca6441cb55049bc53412327c3a23648f643a3033c99c48f
                                                        • Instruction ID: 624af44c813777ead45ce03086e87d393ca74456b767754f7510f724ae4cf6c0
                                                        • Opcode Fuzzy Hash: e609a8aed0e15d6b0ca6441cb55049bc53412327c3a23648f643a3033c99c48f
                                                        • Instruction Fuzzy Hash: 0B316D75A00308BBDB209F54EC88F6A77A9BB55336F108166FE05D62A0E7B4DD44AF60
                                                        APIs
                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00EDFAA6
                                                        • OleUninitialize.OLE32(?,00000000), ref: 00EDFB45
                                                        • UnregisterHotKey.USER32(?), ref: 00EDFC9C
                                                        • DestroyWindow.USER32(?), ref: 00F145D6
                                                        • FreeLibrary.KERNEL32(?), ref: 00F1463B
                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F14668
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                        • String ID: close all
                                                        • API String ID: 469580280-3243417748
                                                        • Opcode ID: aacc903924dcbd3808834f3f97ab376f04b5148de077e641ac7bc11dabd2dd59
                                                        • Instruction ID: b4e00e66ddd5136f258d8dd7a296ca509612d4a8504a8e21abd6bae4c95cb3f1
                                                        • Opcode Fuzzy Hash: aacc903924dcbd3808834f3f97ab376f04b5148de077e641ac7bc11dabd2dd59
                                                        • Instruction Fuzzy Hash: 78A16A31701216CFCB18EF14C9A4AA9F3A4EF45714F1452AEE80ABB362DB30AD56DF50
                                                        APIs
                                                        • EnumChildWindows.USER32(?,00F2A439), ref: 00F2A377
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ChildEnumWindows
                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                        • API String ID: 3555792229-1603158881
                                                        • Opcode ID: 33af5cc09ab527c017150774e0c6bc538ae831cc64f4cddbf01e48cbda2308d2
                                                        • Instruction ID: 1c1417f34ee0cdaeee4a8485b7de3618d2c1b460f299c65dc0e195a2f5635a93
                                                        • Opcode Fuzzy Hash: 33af5cc09ab527c017150774e0c6bc538ae831cc64f4cddbf01e48cbda2308d2
                                                        • Instruction Fuzzy Hash: 8C91F731A00A19EBCB08EFA0D441BEDFBB5FF04310F509119D959B7282DF31A999EB91
                                                        APIs
                                                        • SetWindowLongW.USER32(?,000000EB), ref: 00ED2EAE
                                                          • Part of subcall function 00ED1DB3: GetClientRect.USER32(?,?), ref: 00ED1DDC
                                                          • Part of subcall function 00ED1DB3: GetWindowRect.USER32(?,?), ref: 00ED1E1D
                                                          • Part of subcall function 00ED1DB3: ScreenToClient.USER32(?,?), ref: 00ED1E45
                                                        • GetDC.USER32 ref: 00F0CD32
                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00F0CD45
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00F0CD53
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00F0CD68
                                                        • ReleaseDC.USER32(?,00000000), ref: 00F0CD70
                                                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00F0CDFB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                        • String ID: U
                                                        • API String ID: 4009187628-3372436214
                                                        • Opcode ID: e1d2bdd0101b59c3fc0ab0cc3f5b8c94ed2bad8c267a137d0796662954e64b33
                                                        • Instruction ID: ec9f7fb0e21238401fe622efdeed99dcc82173098d482c8390931e636955ecd4
                                                        • Opcode Fuzzy Hash: e1d2bdd0101b59c3fc0ab0cc3f5b8c94ed2bad8c267a137d0796662954e64b33
                                                        • Instruction Fuzzy Hash: 7871C431900209DFCF218F64CC84AEA7BB5FF58325F14436AEE556B2A6C7319842FB90
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F41A50
                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00F41A7C
                                                        • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00F41ABE
                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00F41AD3
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F41AE0
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00F41B10
                                                        • InternetCloseHandle.WININET(00000000), ref: 00F41B57
                                                          • Part of subcall function 00F42483: GetLastError.KERNEL32(?,?,00F41817,00000000,00000000,00000001), ref: 00F42498
                                                          • Part of subcall function 00F42483: SetEvent.KERNEL32(?,?,00F41817,00000000,00000000,00000001), ref: 00F424AD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                                                        • String ID:
                                                        • API String ID: 2603140658-3916222277
                                                        • Opcode ID: 87f926fb372b02a6b386ddb28345e2bf8b101fb3ba4de1f61fe9c35d36955b2d
                                                        • Instruction ID: 4e5a5d6ab17c993d8beaa72e1ffcd4ddf11cc09b69373c3afda84085e740dca3
                                                        • Opcode Fuzzy Hash: 87f926fb372b02a6b386ddb28345e2bf8b101fb3ba4de1f61fe9c35d36955b2d
                                                        • Instruction Fuzzy Hash: F7416CB1901219BFEB119F50CC89FBA7FACFB48354F00416AFE059A151E7749E84ABA0
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00F5F910), ref: 00F48D28
                                                        • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00F5F910), ref: 00F48D5C
                                                        • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00F48ED6
                                                        • SysFreeString.OLEAUT32(?), ref: 00F48F00
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                        • String ID:
                                                        • API String ID: 560350794-0
                                                        • Opcode ID: be630b99afa230c628483fa667c8afffca89cbb07967210695104703e56f8010
                                                        • Instruction ID: fd6ec04379e4e4ce752dc3748df011ebf273865baa2e639e6c033cb0cbb3fc7c
                                                        • Opcode Fuzzy Hash: be630b99afa230c628483fa667c8afffca89cbb07967210695104703e56f8010
                                                        • Instruction Fuzzy Hash: C9F15C71A00209EFCF14DFA4C884EAEBBB9FF45355F108498F906AB251DB71AE46DB50
                                                        APIs
                                                        • _memset.LIBCMT ref: 00F4F6B5
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F4F848
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F4F86C
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F4F8AC
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F4F8CE
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F4FA4A
                                                        • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00F4FA7C
                                                        • CloseHandle.KERNEL32(?), ref: 00F4FAAB
                                                        • CloseHandle.KERNEL32(?), ref: 00F4FB22
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                        • String ID:
                                                        • API String ID: 4090791747-0
                                                        • Opcode ID: 661fb51fc6a6ccded8f23916fb7d050c529227094b243c7806aaa919b6f18418
                                                        • Instruction ID: c3825021c1dd10adb5748a5a866ce7723e2825921ad3f5c991f20043b17dcfc9
                                                        • Opcode Fuzzy Hash: 661fb51fc6a6ccded8f23916fb7d050c529227094b243c7806aaa919b6f18418
                                                        • Instruction Fuzzy Hash: 38E1C1316043409FC714EF24C881B6ABBE1EF85364F14846DF9899B3A2CB35EC49DB52
                                                        APIs
                                                          • Part of subcall function 00F3466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F33697,?), ref: 00F3468B
                                                          • Part of subcall function 00F3466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F33697,?), ref: 00F346A4
                                                          • Part of subcall function 00F34A31: GetFileAttributesW.KERNEL32(?,00F3370B), ref: 00F34A32
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00F34D40
                                                        • _wcscmp.LIBCMT ref: 00F34D5A
                                                        • MoveFileW.KERNEL32(?,?), ref: 00F34D75
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                        • String ID:
                                                        • API String ID: 793581249-0
                                                        • Opcode ID: 8a065ce26263ddab61e321665a93ced1f9425152bc94d32c3527911e45fc2c74
                                                        • Instruction ID: a2ef7f7af2c4ecffb2b88249f041340f1f7f26f03646f93325d7851484a77824
                                                        • Opcode Fuzzy Hash: 8a065ce26263ddab61e321665a93ced1f9425152bc94d32c3527911e45fc2c74
                                                        • Instruction Fuzzy Hash: 8D5143B24083459BC724DBA4DC819DFB3ECAF85360F00092EB689D3151EF35B689D766
                                                        APIs
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00F586FF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: InvalidateRect
                                                        • String ID:
                                                        • API String ID: 634782764-0
                                                        • Opcode ID: 3d5e68ce69a2bb429c9d3042a938c39f04f127ae84e4f4c3c673d725f3a74f27
                                                        • Instruction ID: ebe2f96ebf610fee3b6d7f42b15d5b79790cfb6d21b10cbd06ebc00a078f08ec
                                                        • Opcode Fuzzy Hash: 3d5e68ce69a2bb429c9d3042a938c39f04f127ae84e4f4c3c673d725f3a74f27
                                                        • Instruction Fuzzy Hash: B151A131900244BFEB209B25DC85F9D3BA4EB057A2F604116FF51F61A1CF71AD8AEB41
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00F0C2F7
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00F0C319
                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00F0C331
                                                        • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00F0C34F
                                                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00F0C370
                                                        • DestroyIcon.USER32(00000000), ref: 00F0C37F
                                                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00F0C39C
                                                        • DestroyIcon.USER32(?), ref: 00F0C3AB
                                                          • Part of subcall function 00F5A4AF: DeleteObject.GDI32(00000000), ref: 00F5A4E8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                                                        • String ID:
                                                        • API String ID: 2819616528-0
                                                        • Opcode ID: 367a71520a6ff1d1a0a0c31075858b27301c2bbb2fbdc0916840ed84ed551e56
                                                        • Instruction ID: c0bb2bd0273be20019cd1a87fddfde585f52b31e310fd37541d3c02f6125ee4a
                                                        • Opcode Fuzzy Hash: 367a71520a6ff1d1a0a0c31075858b27301c2bbb2fbdc0916840ed84ed551e56
                                                        • Instruction Fuzzy Hash: F8516E70A10709EFDB20DF64CC45BAA77E5EB54721F10462EFA02A72D0D7B0AD51EB90
                                                        APIs
                                                          • Part of subcall function 00F2A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F2A84C
                                                          • Part of subcall function 00F2A82C: GetCurrentThreadId.KERNEL32 ref: 00F2A853
                                                          • Part of subcall function 00F2A82C: AttachThreadInput.USER32(00000000,?,00F29683,?,00000001), ref: 00F2A85A
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F2968E
                                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00F296AB
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00F296AE
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F296B7
                                                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00F296D5
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00F296D8
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F296E1
                                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00F296F8
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00F296FB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                        • String ID:
                                                        • API String ID: 2014098862-0
                                                        • Opcode ID: 2c5346b8ab5c10150e400a6ab55dd529090fc6be296828b6e0ee65403dbec614
                                                        • Instruction ID: 9de39db2cc269f1162521432e1cfdff60fd53e177695487b536e18dcd114f454
                                                        • Opcode Fuzzy Hash: 2c5346b8ab5c10150e400a6ab55dd529090fc6be296828b6e0ee65403dbec614
                                                        • Instruction Fuzzy Hash: 3911A1B1950618BFF6106F60EC89F6A7F6DEB4C752F110465F344AB0A1C9F25C50EAA4
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00F2853C,00000B00,?,?), ref: 00F2892A
                                                        • HeapAlloc.KERNEL32(00000000,?,00F2853C,00000B00,?,?), ref: 00F28931
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00F2853C,00000B00,?,?), ref: 00F28946
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00F2853C,00000B00,?,?), ref: 00F2894E
                                                        • DuplicateHandle.KERNEL32(00000000,?,00F2853C,00000B00,?,?), ref: 00F28951
                                                        • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00F2853C,00000B00,?,?), ref: 00F28961
                                                        • GetCurrentProcess.KERNEL32(00F2853C,00000000,?,00F2853C,00000B00,?,?), ref: 00F28969
                                                        • DuplicateHandle.KERNEL32(00000000,?,00F2853C,00000B00,?,?), ref: 00F2896C
                                                        • CreateThread.KERNEL32(00000000,00000000,00F28992,00000000,00000000,00000000), ref: 00F28986
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                        • String ID:
                                                        • API String ID: 1957940570-0
                                                        • Opcode ID: d71d1f0de7b5b61047582e69dbd50eb5f99a16cf607d68dad8a910cd36409742
                                                        • Instruction ID: 786486f8f8891e0b38895635381e60934a72096b1c79d9696e7e884d078f9557
                                                        • Opcode Fuzzy Hash: d71d1f0de7b5b61047582e69dbd50eb5f99a16cf607d68dad8a910cd36409742
                                                        • Instruction Fuzzy Hash: B701BBB5240748FFE710ABA5DC4DF6B3BACEB89711F408461FB05DB1A1CA709804DB21
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                        • API String ID: 0-572801152
                                                        • Opcode ID: 785581cff1f3a44efdaf24d2a85784e69717dd9f9dcf9e29f2b1960d951b4d56
                                                        • Instruction ID: 04260fb2a84360a451f167cc0c2d4bd5f75bf381ee010bde33334c2f860f99d9
                                                        • Opcode Fuzzy Hash: 785581cff1f3a44efdaf24d2a85784e69717dd9f9dcf9e29f2b1960d951b4d56
                                                        • Instruction Fuzzy Hash: 2FC17F71F0421A9BDF10DF98D884AAFBBF5EB48314F148469ED05AB281E7B09D45DBA0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$_memset
                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                        • API String ID: 2862541840-625585964
                                                        • Opcode ID: 4d55b0e93c287fdd0a4209dba617a7a8ac713917abd06f7d946fbf48b8ba045c
                                                        • Instruction ID: 349b4d9eaf527f5f76952e69ad34972e3dcb526006da00be02afb16c16701725
                                                        • Opcode Fuzzy Hash: 4d55b0e93c287fdd0a4209dba617a7a8ac713917abd06f7d946fbf48b8ba045c
                                                        • Instruction Fuzzy Hash: FB919071E04219ABDF24DFA5CC48FAFBBB8EF45720F108159F915AB281D7B09905DBA0
                                                        APIs
                                                          • Part of subcall function 00F2710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F27044,80070057,?,?,?,00F27455), ref: 00F27127
                                                          • Part of subcall function 00F2710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F27044,80070057,?,?), ref: 00F27142
                                                          • Part of subcall function 00F2710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F27044,80070057,?,?), ref: 00F27150
                                                          • Part of subcall function 00F2710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F27044,80070057,?), ref: 00F27160
                                                        • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00F49806
                                                        • _memset.LIBCMT ref: 00F49813
                                                        • _memset.LIBCMT ref: 00F49956
                                                        • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00F49982
                                                        • CoTaskMemFree.OLE32(?), ref: 00F4998D
                                                        Strings
                                                        • NULL Pointer assignment, xrefs: 00F499DB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                        • String ID: NULL Pointer assignment
                                                        • API String ID: 1300414916-2785691316
                                                        • Opcode ID: ee5a6e09d803754c866d485360bdda6186f5e7db6adbaa0e8b074f6dce70fad1
                                                        • Instruction ID: 29a1e8e08defe0fcba047de6a88eb49745845bf92f94360572d7cd8ae4c2074b
                                                        • Opcode Fuzzy Hash: ee5a6e09d803754c866d485360bdda6186f5e7db6adbaa0e8b074f6dce70fad1
                                                        • Instruction Fuzzy Hash: 87914871D04229EBDB10DFA4DC85EDEBBB9EF08310F10415AF919A7281EB719A45DFA0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00F56E24
                                                        • SendMessageW.USER32(?,00001036,00000000,?), ref: 00F56E38
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00F56E52
                                                        • _wcscat.LIBCMT ref: 00F56EAD
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 00F56EC4
                                                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00F56EF2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window_wcscat
                                                        • String ID: SysListView32
                                                        • API String ID: 307300125-78025650
                                                        • Opcode ID: c6ba32903f04d6fef4200f4014aa4ea3cfa68d88747c8b2007b3df7dae423079
                                                        • Instruction ID: e5eb156e4eb050624bfc664b892eccb0e6426e1438024109b37dfa9654ae17fb
                                                        • Opcode Fuzzy Hash: c6ba32903f04d6fef4200f4014aa4ea3cfa68d88747c8b2007b3df7dae423079
                                                        • Instruction Fuzzy Hash: CF41C470A00308ABDB219F64CC45BEE77F8EF08361F50046AFA54E7191D7719D899B60
                                                        APIs
                                                          • Part of subcall function 00F33C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00F33C7A
                                                          • Part of subcall function 00F33C55: Process32FirstW.KERNEL32(00000000,?), ref: 00F33C88
                                                          • Part of subcall function 00F33C55: CloseHandle.KERNEL32(00000000), ref: 00F33D52
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F4E9A4
                                                        • GetLastError.KERNEL32 ref: 00F4E9B7
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F4E9E6
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 00F4EA63
                                                        • GetLastError.KERNEL32(00000000), ref: 00F4EA6E
                                                        • CloseHandle.KERNEL32(00000000), ref: 00F4EAA3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                        • String ID: SeDebugPrivilege
                                                        • API String ID: 2533919879-2896544425
                                                        • Opcode ID: aaaaa1d9f996e863c48ca1e11ce1554f4f111ba400fba436f284bb98574cfe9c
                                                        • Instruction ID: e131339287df3690b08ab3817cd46d8d63190f612a2525766a571751830c8eee
                                                        • Opcode Fuzzy Hash: aaaaa1d9f996e863c48ca1e11ce1554f4f111ba400fba436f284bb98574cfe9c
                                                        • Instruction Fuzzy Hash: FC41AD316002059FDB14EF14DC95F6DBBE5BF40714F188459FA429B3D2CB79A809EB91
                                                        APIs
                                                        • LoadIconW.USER32(00000000,00007F03), ref: 00F33033
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: IconLoad
                                                        • String ID: blank$info$question$stop$warning
                                                        • API String ID: 2457776203-404129466
                                                        • Opcode ID: 9fb628a90009ec513d16e19d44b75ea0cabb7105f256db79b9efa24ffc3b4ef3
                                                        • Instruction ID: 5a2255e483c212ac6041c6681b3f8eea1fc3e422ee5b07dacddfafc38138921e
                                                        • Opcode Fuzzy Hash: 9fb628a90009ec513d16e19d44b75ea0cabb7105f256db79b9efa24ffc3b4ef3
                                                        • Instruction Fuzzy Hash: 3311EB7274C34ABEE719DA54DC82DAB779C9F15374F20002AFB00A6181DB719F4176A5
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00F34312
                                                        • LoadStringW.USER32(00000000), ref: 00F34319
                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00F3432F
                                                        • LoadStringW.USER32(00000000), ref: 00F34336
                                                        • _wprintf.LIBCMT ref: 00F3435C
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00F3437A
                                                        Strings
                                                        • %s (%d) : ==> %s: %s %s, xrefs: 00F34357
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message_wprintf
                                                        • String ID: %s (%d) : ==> %s: %s %s
                                                        • API String ID: 3648134473-3128320259
                                                        • Opcode ID: 06f931074cb853644bf275858341b8d1a814947033b5094ff6dcbb76c32b5b94
                                                        • Instruction ID: 2973691e5f1ed445b9d92fc1b742cff49005283f32b02eeaa7d355f5242c0bfa
                                                        • Opcode Fuzzy Hash: 06f931074cb853644bf275858341b8d1a814947033b5094ff6dcbb76c32b5b94
                                                        • Instruction Fuzzy Hash: 66014FF290030CBFE711A7A0DD89EEB776CDB08311F4005E1BB45E2052EA75AE896B71
                                                        APIs
                                                          • Part of subcall function 00ED2612: GetWindowLongW.USER32(?,000000EB), ref: 00ED2623
                                                        • GetSystemMetrics.USER32(0000000F), ref: 00F5D47C
                                                        • GetSystemMetrics.USER32(0000000F), ref: 00F5D49C
                                                        • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00F5D6D7
                                                        • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00F5D6F5
                                                        • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00F5D716
                                                        • ShowWindow.USER32(00000003,00000000), ref: 00F5D735
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00F5D75A
                                                        • DefDlgProcW.USER32(?,00000005,?,?), ref: 00F5D77D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                        • String ID:
                                                        • API String ID: 1211466189-0
                                                        • Opcode ID: 6ea38879a2057f642981a671b2c151d1ade9ca5eb561ecc8d13f0096a296a90c
                                                        • Instruction ID: 642124abd1cd324cee9076ca3013b8b0a7fcda4d7c9c8768fa54b778d37d52e5
                                                        • Opcode Fuzzy Hash: 6ea38879a2057f642981a671b2c151d1ade9ca5eb561ecc8d13f0096a296a90c
                                                        • Instruction Fuzzy Hash: 2FB18B71A01219EBDF24CF68C9857AD7BB1FF08712F088069EE489F295D734A958EB50
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00F0C1C7,00000004,00000000,00000000,00000000), ref: 00ED2ACF
                                                        • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00F0C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00ED2B17
                                                        • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00F0C1C7,00000004,00000000,00000000,00000000), ref: 00F0C21A
                                                        • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00F0C1C7,00000004,00000000,00000000,00000000), ref: 00F0C286
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ShowWindow
                                                        • String ID:
                                                        • API String ID: 1268545403-0
                                                        • Opcode ID: d9ad93563581b9c9a18b76d0642180f9f820b763c59cd50280039c75d942f43d
                                                        • Instruction ID: 418dd8fad0f06b611e1bc2f02ae74789ef1b661987b6239addf138b1ed63b9f8
                                                        • Opcode Fuzzy Hash: d9ad93563581b9c9a18b76d0642180f9f820b763c59cd50280039c75d942f43d
                                                        • Instruction Fuzzy Hash: DB4148307087809ACB359B28CC8CBAF7B92EB65314F54A91FE347A67A0C6719847F750
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 00F370DD
                                                          • Part of subcall function 00EF0DB6: std::exception::exception.LIBCMT ref: 00EF0DEC
                                                          • Part of subcall function 00EF0DB6: __CxxThrowException@8.LIBCMT ref: 00EF0E01
                                                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00F37114
                                                        • EnterCriticalSection.KERNEL32(?), ref: 00F37130
                                                        • _memmove.LIBCMT ref: 00F3717E
                                                        • _memmove.LIBCMT ref: 00F3719B
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 00F371AA
                                                        • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00F371BF
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00F371DE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                                                        • String ID:
                                                        • API String ID: 256516436-0
                                                        • Opcode ID: d468fd899d684189b86e03d2632c944aaae21fd99784532840c7952d6bc7a98b
                                                        • Instruction ID: b718438e4608bc418f31ba4641a30a4848afe20da231df53e1dd4d76435b9acd
                                                        • Opcode Fuzzy Hash: d468fd899d684189b86e03d2632c944aaae21fd99784532840c7952d6bc7a98b
                                                        • Instruction Fuzzy Hash: 13316176900209EBCF10EFA4DC859AFBBB8EF45711F1441B5FA04AB256DB709E14DBA0
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00F561EB
                                                        • GetDC.USER32(00000000), ref: 00F561F3
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F561FE
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00F5620A
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00F56246
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00F56257
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00F5902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00F56291
                                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00F562B1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                        • String ID:
                                                        • API String ID: 3864802216-0
                                                        • Opcode ID: 1d2ff3aef39e84addea8533b3102df8ab0b9f64a298d173e611f22399203d93e
                                                        • Instruction ID: 2633672f313dc4d0a3edd2eb57e32ac9d34ece87fed01c3143d0ab300615ef58
                                                        • Opcode Fuzzy Hash: 1d2ff3aef39e84addea8533b3102df8ab0b9f64a298d173e611f22399203d93e
                                                        • Instruction Fuzzy Hash: 5D315C72101214BFEF118F508C8AFAB3BA9EF49766F0440A5FF08DA192C6759845DB60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: 9840b574a6c8bf15b376bcf6ba748677dcdd40a72dabb31535d01db2ccfa122a
                                                        • Instruction ID: c581ad40d82043ac9b37c06e3f61493883e311f7565db2e9235c5a8f28d72f72
                                                        • Opcode Fuzzy Hash: 9840b574a6c8bf15b376bcf6ba748677dcdd40a72dabb31535d01db2ccfa122a
                                                        • Instruction Fuzzy Hash: B3219C71A4162E77E6046611BD42FFB775D9E90378F044020FE0466687EB54DF11B1A1
                                                        APIs
                                                          • Part of subcall function 00ED9837: __itow.LIBCMT ref: 00ED9862
                                                          • Part of subcall function 00ED9837: __swprintf.LIBCMT ref: 00ED98AC
                                                          • Part of subcall function 00EEFC86: _wcscpy.LIBCMT ref: 00EEFCA9
                                                        • _wcstok.LIBCMT ref: 00F3EC94
                                                        • _wcscpy.LIBCMT ref: 00F3ED23
                                                        • _memset.LIBCMT ref: 00F3ED56
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                        • String ID: X
                                                        • API String ID: 774024439-3081909835
                                                        • Opcode ID: ad606f43a1c1d1f91d9a582feb701b91e76e8b0e05dbb6b157c0acf1d9e503c2
                                                        • Instruction ID: 2acf14aea22cec242d77aaab2d2cf158d2b920b5dac261fdfcca874220b75fbf
                                                        • Opcode Fuzzy Hash: ad606f43a1c1d1f91d9a582feb701b91e76e8b0e05dbb6b157c0acf1d9e503c2
                                                        • Instruction Fuzzy Hash: 25C171715087419FC714EF24C885A6AB7E0FF85320F11592EF999A73A2DB70EC46DB42
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: be931bf582bd021c159e7976570e16ad9e39afc91f4f72da5ede64e33d6f5688
                                                        • Instruction ID: 607f56f80038d6fa2462703e639a6a971254d267e70fa9005f5dd5cf41e4ee40
                                                        • Opcode Fuzzy Hash: be931bf582bd021c159e7976570e16ad9e39afc91f4f72da5ede64e33d6f5688
                                                        • Instruction Fuzzy Hash: D1714D30900119FFCB149F98CC45ABEBB79FF85325F14819AF915AB291C734AA52DBA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1a6129a9405a388d18eb60861f58758127cd23074a00774a3d3977e3f7852a70
                                                        • Instruction ID: 78ad9771f06360d4aaaffe7a026df9f31941b908adf9fb29ad7d76e848d342fd
                                                        • Opcode Fuzzy Hash: 1a6129a9405a388d18eb60861f58758127cd23074a00774a3d3977e3f7852a70
                                                        • Instruction Fuzzy Hash: 5761AF72604300ABC710EB24DC92E6BBBF8EF85724F10591EF955AB292DB709D05D752
                                                        APIs
                                                        • IsWindow.USER32(01796450), ref: 00F5B3EB
                                                        • IsWindowEnabled.USER32(01796450), ref: 00F5B3F7
                                                        • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00F5B4DB
                                                        • SendMessageW.USER32(01796450,000000B0,?,?), ref: 00F5B512
                                                        • IsDlgButtonChecked.USER32(?,?), ref: 00F5B54F
                                                        • GetWindowLongW.USER32(01796450,000000EC), ref: 00F5B571
                                                        • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00F5B589
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                        • String ID:
                                                        • API String ID: 4072528602-0
                                                        • Opcode ID: fe890a6f4b5bfbe53622416c161e965920273f771a9fcbced73ddfe84d2c8394
                                                        • Instruction ID: 3f644fefe14eca17fb4cf79d88da82bf9f4f385c5df5be972e44a7b38e0912c7
                                                        • Opcode Fuzzy Hash: fe890a6f4b5bfbe53622416c161e965920273f771a9fcbced73ddfe84d2c8394
                                                        • Instruction Fuzzy Hash: C3718E34A04608AFDF35DF54C894FBABBA5FF09322F144059EF46972A2C731A949EB50
                                                        APIs
                                                        • _memset.LIBCMT ref: 00F4F448
                                                        • _memset.LIBCMT ref: 00F4F511
                                                        • ShellExecuteExW.SHELL32(?), ref: 00F4F556
                                                          • Part of subcall function 00ED9837: __itow.LIBCMT ref: 00ED9862
                                                          • Part of subcall function 00ED9837: __swprintf.LIBCMT ref: 00ED98AC
                                                          • Part of subcall function 00EEFC86: _wcscpy.LIBCMT ref: 00EEFCA9
                                                        • GetProcessId.KERNEL32(00000000), ref: 00F4F5CD
                                                        • CloseHandle.KERNEL32(00000000), ref: 00F4F5FC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                                                        • String ID: @
                                                        • API String ID: 3522835683-2766056989
                                                        • Opcode ID: 0ae3cb70c11e86add922db96e7fb0d62d423e6a78ba1d6f58ab2b8177709e3e6
                                                        • Instruction ID: c2b8b0109cdb16657657a5ef7e88bd8061349534a1479801c64e61deda50a4f1
                                                        • Opcode Fuzzy Hash: 0ae3cb70c11e86add922db96e7fb0d62d423e6a78ba1d6f58ab2b8177709e3e6
                                                        • Instruction Fuzzy Hash: F6617E75E006199FCB14EF64C8819AEBBF5FF49320F14806AE859BB361CB31AD45DB90
                                                        APIs
                                                        • GetParent.USER32(?), ref: 00F30F8C
                                                        • GetKeyboardState.USER32(?), ref: 00F30FA1
                                                        • SetKeyboardState.USER32(?), ref: 00F31002
                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 00F31030
                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 00F3104F
                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 00F31095
                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00F310B8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: f37887d4409e05bd1faba481cfa108e9fd26fc352ffb9157b43d0889283ab60a
                                                        • Instruction ID: b6a4bdfa84d236b97b0385f646ab9d99e1ad6e766d9820b896e2ad8551957260
                                                        • Opcode Fuzzy Hash: f37887d4409e05bd1faba481cfa108e9fd26fc352ffb9157b43d0889283ab60a
                                                        • Instruction Fuzzy Hash: D851E5A09047D53DFB3642348C15BBABEA96B06334F08858AE1D5468D3C6D9DCC8F751
                                                        APIs
                                                        • GetParent.USER32(00000000), ref: 00F30DA5
                                                        • GetKeyboardState.USER32(?), ref: 00F30DBA
                                                        • SetKeyboardState.USER32(?), ref: 00F30E1B
                                                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00F30E47
                                                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00F30E64
                                                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00F30EA8
                                                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00F30EC9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: 8500d8b455b45fa0a3f996a0b7f31971ac6325429d56f1f450ec999539bef0c0
                                                        • Instruction ID: 5247d08dc320b86c4622c7bdd8886b2a635b1fe0f3e3870de238eee9e9158a43
                                                        • Opcode Fuzzy Hash: 8500d8b455b45fa0a3f996a0b7f31971ac6325429d56f1f450ec999539bef0c0
                                                        • Instruction Fuzzy Hash: E251D6A0A447D57DFB3683748C65B7A7EA96B06330F08888AE1D4464C2DB95ECD8F750
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _wcsncpy$LocalTime
                                                        • String ID:
                                                        • API String ID: 2945705084-0
                                                        • Opcode ID: 5606dd58f83386146577aacbf66d28c13cd209456486e2df2e86d18f1ec0f4f0
                                                        • Instruction ID: 5c8b7f8f4e99025040688845f3f2fa6e8899077c95846e667946ddc3fa45522f
                                                        • Opcode Fuzzy Hash: 5606dd58f83386146577aacbf66d28c13cd209456486e2df2e86d18f1ec0f4f0
                                                        • Instruction Fuzzy Hash: 69419265C1161C76CB11EBF4984A9EFB3F8AF44710F509956EB08F3221EB34A345C7AA
                                                        APIs
                                                          • Part of subcall function 00F3466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F33697,?), ref: 00F3468B
                                                          • Part of subcall function 00F3466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F33697,?), ref: 00F346A4
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 00F336B7
                                                        • _wcscmp.LIBCMT ref: 00F336D3
                                                        • MoveFileW.KERNEL32(?,?), ref: 00F336EB
                                                        • _wcscat.LIBCMT ref: 00F33733
                                                        • SHFileOperationW.SHELL32(?), ref: 00F3379F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 1377345388-1173974218
                                                        • Opcode ID: 9bac5f31a596e227babe3b951df384dd0cf9c53559ae47c95f8c4ed6b0999bd0
                                                        • Instruction ID: 486b5fddca599cd307dee2125a19a8f9a460f1156c3241d1ab995c93097f4931
                                                        • Opcode Fuzzy Hash: 9bac5f31a596e227babe3b951df384dd0cf9c53559ae47c95f8c4ed6b0999bd0
                                                        • Instruction Fuzzy Hash: D341B471508348AEC751EF64C8469DFB7E8EF883A0F00186EF59AC3251EB34D689D752
                                                        APIs
                                                        • _memset.LIBCMT ref: 00F572AA
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F57351
                                                        • IsMenu.USER32(?), ref: 00F57369
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F573B1
                                                        • DrawMenuBar.USER32 ref: 00F573C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$DrawInfoInsert_memset
                                                        • String ID: 0
                                                        • API String ID: 3866635326-4108050209
                                                        • Opcode ID: ac54108469644d1574250a9fd1c465d2f58171ce95b332281568d95b39c393a6
                                                        • Instruction ID: 1ee7336059c3e6e0310a142e7d6043b66ce06ade13b593bab1a80667d5388d5e
                                                        • Opcode Fuzzy Hash: ac54108469644d1574250a9fd1c465d2f58171ce95b332281568d95b39c393a6
                                                        • Instruction Fuzzy Hash: 15411875A04308AFDB20EF50E884A9ABBF8FF05361F149569FE15A7250D730AD58EF50
                                                        APIs
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00F50FD4
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F50FFE
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00F510B5
                                                          • Part of subcall function 00F50FA5: RegCloseKey.ADVAPI32(?), ref: 00F5101B
                                                          • Part of subcall function 00F50FA5: FreeLibrary.KERNEL32(?), ref: 00F5106D
                                                          • Part of subcall function 00F50FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00F51090
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00F51058
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                        • String ID:
                                                        • API String ID: 395352322-0
                                                        • Opcode ID: 52d1ad052f2c01224736867caabe424add3ac4d41fec65dcd3ae7bbf89c37076
                                                        • Instruction ID: 98ee071ef8ec4f2b9aacf130e2dcd90cca917566a732d43d919057fb4b99051a
                                                        • Opcode Fuzzy Hash: 52d1ad052f2c01224736867caabe424add3ac4d41fec65dcd3ae7bbf89c37076
                                                        • Instruction Fuzzy Hash: 9231E171D01109BFDB159F90DC85EFFB7BCEF08311F044169EA15A2191DA74AE89AA60
                                                        APIs
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00F562EC
                                                        • GetWindowLongW.USER32(01796450,000000F0), ref: 00F5631F
                                                        • GetWindowLongW.USER32(01796450,000000F0), ref: 00F56354
                                                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00F56386
                                                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00F563B0
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00F563C1
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00F563DB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$MessageSend
                                                        • String ID:
                                                        • API String ID: 2178440468-0
                                                        • Opcode ID: 5d69312cc440b590e6df9c911eab3f4942c91a08d5b2164a0c4c9abae23162be
                                                        • Instruction ID: b66c3fddf178f7f9942fe82f41144603ecc0bc823e7063bd720b2db7406f2487
                                                        • Opcode Fuzzy Hash: 5d69312cc440b590e6df9c911eab3f4942c91a08d5b2164a0c4c9abae23162be
                                                        • Instruction Fuzzy Hash: 20310231A44254AFEB21CF18DC84F5537E1FB4A766F5901A5FA21CF2B2CB71A848EB50
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F2DB2E
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F2DB54
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00F2DB57
                                                        • SysAllocString.OLEAUT32(?), ref: 00F2DB75
                                                        • SysFreeString.OLEAUT32(?), ref: 00F2DB7E
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00F2DBA3
                                                        • SysAllocString.OLEAUT32(?), ref: 00F2DBB1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: 90c0ee9bedfe270bf8264311efee0d88bc1322e152eb3ae6803ff58a0152f293
                                                        • Instruction ID: a2ecd81b445321f0d00a16c0abb3e027f94c90390ba48e78a474673e01843b43
                                                        • Opcode Fuzzy Hash: 90c0ee9bedfe270bf8264311efee0d88bc1322e152eb3ae6803ff58a0152f293
                                                        • Instruction Fuzzy Hash: 4521A132A01229AF9F10DFA8EC98CBB73ACEB48360B018165FE14DB250D770AC45A760
                                                        APIs
                                                          • Part of subcall function 00F47D8B: inet_addr.WSOCK32(00000000), ref: 00F47DB6
                                                        • socket.WSOCK32(00000002,00000001,00000006), ref: 00F461C6
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F461D5
                                                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00F4620E
                                                        • connect.WSOCK32(00000000,?,00000010), ref: 00F46217
                                                        • WSAGetLastError.WSOCK32 ref: 00F46221
                                                        • closesocket.WSOCK32(00000000), ref: 00F4624A
                                                        • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00F46263
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 910771015-0
                                                        • Opcode ID: f1d71fa9cefbb146e9cf347d144fef5de70a23f85184f6b7a7addef3026157fe
                                                        • Instruction ID: f96622487f24c48d7d495a5fe31156605814c3d2c7595170c004ba5b2a92468d
                                                        • Opcode Fuzzy Hash: f1d71fa9cefbb146e9cf347d144fef5de70a23f85184f6b7a7addef3026157fe
                                                        • Instruction Fuzzy Hash: F331B531600218AFDF10AF24CC85BBD7BACEF45721F044069FD05E7291DB74AD04AB62
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __wcsnicmp
                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                        • API String ID: 1038674560-2734436370
                                                        • Opcode ID: 1affbb937906beabc92efa5d5bd9b5342dcb783c880b661414d49f714ea8b89f
                                                        • Instruction ID: d7b0e517e03bdd2465cbf657c8721f5fc620e971f4ddf342e3b71c6011ab24c6
                                                        • Opcode Fuzzy Hash: 1affbb937906beabc92efa5d5bd9b5342dcb783c880b661414d49f714ea8b89f
                                                        • Instruction Fuzzy Hash: CD21467262463166D220AB34FC02FB773E8EF55360F14403AF946D6191EB519D4AE395
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F2DC09
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F2DC2F
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00F2DC32
                                                        • SysAllocString.OLEAUT32 ref: 00F2DC53
                                                        • SysFreeString.OLEAUT32 ref: 00F2DC5C
                                                        • StringFromGUID2.OLE32(?,?,00000028), ref: 00F2DC76
                                                        • SysAllocString.OLEAUT32(?), ref: 00F2DC84
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: 73900e61ea147cc32d3c425549a9d63eed6d402d42b3729f773e0245b3280b1d
                                                        • Instruction ID: 389a07bc5a250cfe724fcea3ebb9ab63d94e8c44668b2665dcf4f37a7805f62e
                                                        • Opcode Fuzzy Hash: 73900e61ea147cc32d3c425549a9d63eed6d402d42b3729f773e0245b3280b1d
                                                        • Instruction Fuzzy Hash: 36219836605218AFDB10DFB8EC88DBB77ECEB09360B508165FA14CB261D670EC45D764
                                                        APIs
                                                          • Part of subcall function 00ED1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00ED1D73
                                                          • Part of subcall function 00ED1D35: GetStockObject.GDI32(00000011), ref: 00ED1D87
                                                          • Part of subcall function 00ED1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00ED1D91
                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00F57632
                                                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00F5763F
                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00F5764A
                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00F57659
                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00F57665
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                        • String ID: Msctls_Progress32
                                                        • API String ID: 1025951953-3636473452
                                                        • Opcode ID: 14f34e80d08a124e1995d8a1fbe2fcd3c6093aa7d1e7bf5c424af4fe45c29e50
                                                        • Instruction ID: fbf0f2c22f543d5b195b651ee75b1ace989039557b2db1eaca9596d9916a0ab2
                                                        • Opcode Fuzzy Hash: 14f34e80d08a124e1995d8a1fbe2fcd3c6093aa7d1e7bf5c424af4fe45c29e50
                                                        • Instruction Fuzzy Hash: 4A1193B211021DBFEF159F64CC85EE77F5DEF087A8F014115BB04A2050CA729C21EBA4
                                                        APIs
                                                        • __init_pointers.LIBCMT ref: 00EF9AE6
                                                          • Part of subcall function 00EF3187: EncodePointer.KERNEL32(00000000), ref: 00EF318A
                                                          • Part of subcall function 00EF3187: __initp_misc_winsig.LIBCMT ref: 00EF31A5
                                                          • Part of subcall function 00EF3187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00EF9EA0
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00EF9EB4
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00EF9EC7
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00EF9EDA
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00EF9EED
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00EF9F00
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 00EF9F13
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00EF9F26
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00EF9F39
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00EF9F4C
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00EF9F5F
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00EF9F72
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00EF9F85
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00EF9F98
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00EF9FAB
                                                          • Part of subcall function 00EF3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00EF9FBE
                                                        • __mtinitlocks.LIBCMT ref: 00EF9AEB
                                                        • __mtterm.LIBCMT ref: 00EF9AF4
                                                          • Part of subcall function 00EF9B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00EF9AF9,00EF7CD0,00F8A0B8,00000014), ref: 00EF9C56
                                                          • Part of subcall function 00EF9B5C: _free.LIBCMT ref: 00EF9C5D
                                                          • Part of subcall function 00EF9B5C: DeleteCriticalSection.KERNEL32(00F8EC00,?,?,00EF9AF9,00EF7CD0,00F8A0B8,00000014), ref: 00EF9C7F
                                                        • __calloc_crt.LIBCMT ref: 00EF9B19
                                                        • __initptd.LIBCMT ref: 00EF9B3B
                                                        • GetCurrentThreadId.KERNEL32 ref: 00EF9B42
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                                                        • String ID:
                                                        • API String ID: 3567560977-0
                                                        • Opcode ID: 49f3f23a5ceb70875c879f085288332f70da58ac528a29e6dfc6769462cc94ca
                                                        • Instruction ID: 1003e1d476fa3b4f47a6868cac927d1ca942aac15b2609dd46005befd262d017
                                                        • Opcode Fuzzy Hash: 49f3f23a5ceb70875c879f085288332f70da58ac528a29e6dfc6769462cc94ca
                                                        • Instruction Fuzzy Hash: B6F0C232619B1D19E73476747C07BBA36D09B02338B202659F7D4F50D7EF6184000264
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00EF3F85), ref: 00EF4085
                                                        • GetProcAddress.KERNEL32(00000000), ref: 00EF408C
                                                        • EncodePointer.KERNEL32(00000000), ref: 00EF4097
                                                        • DecodePointer.KERNEL32(00EF3F85), ref: 00EF40B2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                                                        • String ID: RoUninitialize$combase.dll
                                                        • API String ID: 3489934621-2819208100
                                                        • Opcode ID: 76812f64d6dcf90755b436e56ede686e9d40cb9a2dd5467138756cab72388c3c
                                                        • Instruction ID: 9f715dca09ccd9a9df992021827ef103fb5eb7e887e48f6fc8e8118c8f69be18
                                                        • Opcode Fuzzy Hash: 76812f64d6dcf90755b436e56ede686e9d40cb9a2dd5467138756cab72388c3c
                                                        • Instruction Fuzzy Hash: 82E0B6B0981708EFEB61AF61EC0DB163AA4B704787F104066F205E20F0CFB68648FA16
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memmove$__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 3253778849-0
                                                        • Opcode ID: 1a44ea1867cdb98926dfc3f4012692738adcbdbdccd52b9821b2ba9a2b0d409a
                                                        • Instruction ID: 9d80fb99b31ff3e3b8af47775d15159e50141b308aa1ce1f51ec825ee7af74a5
                                                        • Opcode Fuzzy Hash: 1a44ea1867cdb98926dfc3f4012692738adcbdbdccd52b9821b2ba9a2b0d409a
                                                        • Instruction Fuzzy Hash: 7761AD3590025AABCF05EF60CC82EFE37A5EF45328F048529F955AB293DB34D806EB50
                                                        APIs
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                          • Part of subcall function 00F50E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F4FDAD,?,?), ref: 00F50E31
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F502BD
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F502FD
                                                        • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00F50320
                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00F50349
                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00F5038C
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00F50399
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                                                        • String ID:
                                                        • API String ID: 4046560759-0
                                                        • Opcode ID: d65b2d943943fe7136e947098fbba09eeba9426349e0efa5a42222f4fc3f9daf
                                                        • Instruction ID: 54c0484343e16f085154fff1d6705f8891e08329179b41a03b4ae883dc01602d
                                                        • Opcode Fuzzy Hash: d65b2d943943fe7136e947098fbba09eeba9426349e0efa5a42222f4fc3f9daf
                                                        • Instruction Fuzzy Hash: 08515871508304AFC710EF64C885E6EBBE8FF85314F04491DFA95972A2DB31E909DB52
                                                        APIs
                                                        • GetMenu.USER32(?), ref: 00F557FB
                                                        • GetMenuItemCount.USER32(00000000), ref: 00F55832
                                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00F5585A
                                                        • GetMenuItemID.USER32(?,?), ref: 00F558C9
                                                        • GetSubMenu.USER32(?,?), ref: 00F558D7
                                                        • PostMessageW.USER32(?,00000111,?,00000000), ref: 00F55928
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountMessagePostString
                                                        • String ID:
                                                        • API String ID: 650687236-0
                                                        • Opcode ID: a12443c300ada88d22ae2995d2ed9d7921e8f1d56c6996e460208fb4577223d8
                                                        • Instruction ID: 37968119492fcad4d73d8d6e1150ac0a44440861795683d55604d8d124d28392
                                                        • Opcode Fuzzy Hash: a12443c300ada88d22ae2995d2ed9d7921e8f1d56c6996e460208fb4577223d8
                                                        • Instruction Fuzzy Hash: E7516D35E00619EFCF05EF64C855AAEB7B4EF48721F1440A9EE01BB351CB34AE45AB90
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00F2EF06
                                                        • VariantClear.OLEAUT32(00000013), ref: 00F2EF78
                                                        • VariantClear.OLEAUT32(00000000), ref: 00F2EFD3
                                                        • _memmove.LIBCMT ref: 00F2EFFD
                                                        • VariantClear.OLEAUT32(?), ref: 00F2F04A
                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00F2F078
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ChangeInitType_memmove
                                                        • String ID:
                                                        • API String ID: 1101466143-0
                                                        • Opcode ID: a13e6827af693f6feae158b4323caaa6626bf49627e7b4beb1abe4a7fcb306f8
                                                        • Instruction ID: 8ebe3452a994d6496059070cd48ce1816d0c0ac11ba66140218fad11f2e84382
                                                        • Opcode Fuzzy Hash: a13e6827af693f6feae158b4323caaa6626bf49627e7b4beb1abe4a7fcb306f8
                                                        • Instruction Fuzzy Hash: 2E5179B5A00219EFCB10DF58D884AAAB7B8FF4C310B158569EA49DB305E330E915CFA0
                                                        APIs
                                                        • _memset.LIBCMT ref: 00F32258
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F322A3
                                                        • IsMenu.USER32(00000000), ref: 00F322C3
                                                        • CreatePopupMenu.USER32 ref: 00F322F7
                                                        • GetMenuItemCount.USER32(000000FF), ref: 00F32355
                                                        • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00F32386
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                        • String ID:
                                                        • API String ID: 3311875123-0
                                                        • Opcode ID: 5066f846b308381d0b391d45f89316f45d30032f227aba5ef40b4450da9bedfb
                                                        • Instruction ID: a43b9542252b5f9bfb559f403722fd11e2db1fb815063f5cc03f6676a43375cb
                                                        • Opcode Fuzzy Hash: 5066f846b308381d0b391d45f89316f45d30032f227aba5ef40b4450da9bedfb
                                                        • Instruction Fuzzy Hash: EC51CD30A01309EBDF61CF68D888BAEBBF5BF05334F144169E855AB290E3799904EB51
                                                        APIs
                                                          • Part of subcall function 00ED2612: GetWindowLongW.USER32(?,000000EB), ref: 00ED2623
                                                        • BeginPaint.USER32(?,?,?,?,?,?), ref: 00ED179A
                                                        • GetWindowRect.USER32(?,?), ref: 00ED17FE
                                                        • ScreenToClient.USER32(?,?), ref: 00ED181B
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00ED182C
                                                        • EndPaint.USER32(?,?), ref: 00ED1876
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: PaintWindow$BeginClientLongRectScreenViewport
                                                        • String ID:
                                                        • API String ID: 1827037458-0
                                                        • Opcode ID: 063da23ea0b3aa8acb808000716abc13b7c5256b9941ec951c28d07b77187d1d
                                                        • Instruction ID: dcedf924c3039281c1d7fa6c26839fa808134c4b358983163dd69159cc7c4b2b
                                                        • Opcode Fuzzy Hash: 063da23ea0b3aa8acb808000716abc13b7c5256b9941ec951c28d07b77187d1d
                                                        • Instruction Fuzzy Hash: 9741B330504704AFDB11DF25DC84FBA7BE8EB46724F0446AAF6A4972B1C7319846FB61
                                                        APIs
                                                        • ShowWindow.USER32(00F957B0,00000000,01796450,?,?,00F957B0,?,00F5B5A8,?,?), ref: 00F5B712
                                                        • EnableWindow.USER32(00000000,00000000), ref: 00F5B736
                                                        • ShowWindow.USER32(00F957B0,00000000,01796450,?,?,00F957B0,?,00F5B5A8,?,?), ref: 00F5B796
                                                        • ShowWindow.USER32(00000000,00000004,?,00F5B5A8,?,?), ref: 00F5B7A8
                                                        • EnableWindow.USER32(00000000,00000001), ref: 00F5B7CC
                                                        • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00F5B7EF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$Show$Enable$MessageSend
                                                        • String ID:
                                                        • API String ID: 642888154-0
                                                        • Opcode ID: ce0ca474de4516ef59157b944b1e6a86c6c82372aa0a3f80dd505450207e506d
                                                        • Instruction ID: 95feb9116ad1a824231ec70b1acc89727587bfc2cc2bfd05b550aaeb4ab0c216
                                                        • Opcode Fuzzy Hash: ce0ca474de4516ef59157b944b1e6a86c6c82372aa0a3f80dd505450207e506d
                                                        • Instruction Fuzzy Hash: 95416734900244AFDB25CF24D499B957BE1FF49322F1841B5EF488F562C731A85ADB51
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,?,?,?,?,?,00F44E41,?,?,00000000,00000001), ref: 00F470AC
                                                          • Part of subcall function 00F439A0: GetWindowRect.USER32(?,?), ref: 00F439B3
                                                        • GetDesktopWindow.USER32 ref: 00F470D6
                                                        • GetWindowRect.USER32(00000000), ref: 00F470DD
                                                        • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00F4710F
                                                          • Part of subcall function 00F35244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F352BC
                                                        • GetCursorPos.USER32(?), ref: 00F4713B
                                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00F47199
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                        • String ID:
                                                        • API String ID: 4137160315-0
                                                        • Opcode ID: 6058056514662d5d06031091f7230db4415b6e6fff6bc7f2377a2129fed3c7cc
                                                        • Instruction ID: 68bf0b6b8fa45277fb18192ad7dba03ecbf112a6fab4f0d350fb0fc8d6b4f525
                                                        • Opcode Fuzzy Hash: 6058056514662d5d06031091f7230db4415b6e6fff6bc7f2377a2129fed3c7cc
                                                        • Instruction Fuzzy Hash: FD31D272509309ABD720EF14CC49F9BBBAAFFC8314F000919F985A7191D734EA09DB92
                                                        APIs
                                                          • Part of subcall function 00F280A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F280C0
                                                          • Part of subcall function 00F280A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F280CA
                                                          • Part of subcall function 00F280A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F280D9
                                                          • Part of subcall function 00F280A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F280E0
                                                          • Part of subcall function 00F280A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F280F6
                                                        • GetLengthSid.ADVAPI32(?,00000000,00F2842F), ref: 00F288CA
                                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00F288D6
                                                        • HeapAlloc.KERNEL32(00000000), ref: 00F288DD
                                                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 00F288F6
                                                        • GetProcessHeap.KERNEL32(00000000,00000000,00F2842F), ref: 00F2890A
                                                        • HeapFree.KERNEL32(00000000), ref: 00F28911
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                        • String ID:
                                                        • API String ID: 3008561057-0
                                                        • Opcode ID: 4369b643c19301ec8a16b7961e1512e995deb0ac338f82626343f84bdcbbe5f7
                                                        • Instruction ID: a7d456a34720214083a0285449942f5606c347b93e6562ae47438f56a8381309
                                                        • Opcode Fuzzy Hash: 4369b643c19301ec8a16b7961e1512e995deb0ac338f82626343f84bdcbbe5f7
                                                        • Instruction Fuzzy Hash: 5A11B132902619FFDB109FA4EC09BBE7B68EB44362F148068E945D7111CB329D46EB60
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00F285E2
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00F285E9
                                                        • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00F285F8
                                                        • CloseHandle.KERNEL32(00000004), ref: 00F28603
                                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F28632
                                                        • DestroyEnvironmentBlock.USERENV(00000000), ref: 00F28646
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                        • String ID:
                                                        • API String ID: 1413079979-0
                                                        • Opcode ID: 36a355df30eba9b277815d6afef514e81f3bf5c1442ef6d2776da7dc03a4e62d
                                                        • Instruction ID: 097c748c020bd0da509d7ca3e59a0e12826a4f0a5b75c85fcb2765168d4b1ac7
                                                        • Opcode Fuzzy Hash: 36a355df30eba9b277815d6afef514e81f3bf5c1442ef6d2776da7dc03a4e62d
                                                        • Instruction Fuzzy Hash: F1116AB250220DABDF018FA4ED49FDE7BA9EF08355F084064FE05A21A0C7729D65EB60
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00F2B7B5
                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00F2B7C6
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F2B7CD
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00F2B7D5
                                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00F2B7EC
                                                        • MulDiv.KERNEL32(000009EC,?,?), ref: 00F2B7FE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CapsDevice$Release
                                                        • String ID:
                                                        • API String ID: 1035833867-0
                                                        • Opcode ID: 94321793307ea9667ded1a10677aa6e57f0b40bac890c75421f0bd8faf481fcd
                                                        • Instruction ID: 98ee6ca24a404fac91b1ee4079dc5bf73e9e655d5ab8b3adf2c2c51c1c3acb88
                                                        • Opcode Fuzzy Hash: 94321793307ea9667ded1a10677aa6e57f0b40bac890c75421f0bd8faf481fcd
                                                        • Instruction Fuzzy Hash: D3018475E00319BBEB109BA69C45A5EBFB8EB48321F0040B5FF04EB291D6309C04DF90
                                                        APIs
                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00EF0193
                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 00EF019B
                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00EF01A6
                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00EF01B1
                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 00EF01B9
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EF01C1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Virtual
                                                        • String ID:
                                                        • API String ID: 4278518827-0
                                                        • Opcode ID: 39aaf055f2d17ff8a334dca0fb025251d83cd6eb32c0ea82540ad95bd9a74a47
                                                        • Instruction ID: 4ffd7459b55b67004f8428738d5149251d096aca1a94612b1b7153e72e875c47
                                                        • Opcode Fuzzy Hash: 39aaf055f2d17ff8a334dca0fb025251d83cd6eb32c0ea82540ad95bd9a74a47
                                                        • Instruction Fuzzy Hash: 43016CB09017597DE3009F5A8C85B52FFE8FF19354F00415BA15C47941C7F5A868CBE5
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00F353F9
                                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00F3540F
                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 00F3541E
                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F3542D
                                                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F35437
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F3543E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 839392675-0
                                                        • Opcode ID: 87be0ddaa886498bb8746757dc129c3af64614cf0730a01f61977b253a1defb0
                                                        • Instruction ID: eb47b0904c88b6f172b53fb6eacb072d555aba0ff5168caeaff112392fcaa9fe
                                                        • Opcode Fuzzy Hash: 87be0ddaa886498bb8746757dc129c3af64614cf0730a01f61977b253a1defb0
                                                        • Instruction Fuzzy Hash: E4F01D3264165CBBE7215BA2DC0DEAB7B7CEBC6B12F0001A9FB05D206196A11A05A6B5
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,?), ref: 00F37243
                                                        • EnterCriticalSection.KERNEL32(?,?,00EE0EE4,?,?), ref: 00F37254
                                                        • TerminateThread.KERNEL32(00000000,000001F6,?,00EE0EE4,?,?), ref: 00F37261
                                                        • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00EE0EE4,?,?), ref: 00F3726E
                                                          • Part of subcall function 00F36C35: CloseHandle.KERNEL32(00000000,?,00F3727B,?,00EE0EE4,?,?), ref: 00F36C3F
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00F37281
                                                        • LeaveCriticalSection.KERNEL32(?,?,00EE0EE4,?,?), ref: 00F37288
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 3495660284-0
                                                        • Opcode ID: f47957cb713c378d07a73e7e59c5a87dd725bc2e5cadb6bbb0b69331d9267610
                                                        • Instruction ID: 731d2b1033b69c28be3cbfee72bfcac0d9dae599b29993d70b3ed91128ac32fb
                                                        • Opcode Fuzzy Hash: f47957cb713c378d07a73e7e59c5a87dd725bc2e5cadb6bbb0b69331d9267610
                                                        • Instruction Fuzzy Hash: 15F05EB6541716EBDB122B64ED4C9DB7729EF45723F100571F603914A0CB7A5805EB50
                                                        APIs
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00F2899D
                                                        • UnloadUserProfile.USERENV(?,?), ref: 00F289A9
                                                        • CloseHandle.KERNEL32(?), ref: 00F289B2
                                                        • CloseHandle.KERNEL32(?), ref: 00F289BA
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00F289C3
                                                        • HeapFree.KERNEL32(00000000), ref: 00F289CA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                        • String ID:
                                                        • API String ID: 146765662-0
                                                        • Opcode ID: c9e66b17401a949f9c73dcde777b6a8f759fae44859c40939d51645e491f4d35
                                                        • Instruction ID: a1512b1a25ac41438a20eaffc439eb23b660bfa9f0839c212a3e91d06bd8e0de
                                                        • Opcode Fuzzy Hash: c9e66b17401a949f9c73dcde777b6a8f759fae44859c40939d51645e491f4d35
                                                        • Instruction Fuzzy Hash: BBE05276105609FBDA012FE5EC0C95ABB69FB89763B508671F31981470CB32A469EB50
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00F48613
                                                        • CharUpperBuffW.USER32(?,?), ref: 00F48722
                                                        • VariantClear.OLEAUT32(?), ref: 00F4889A
                                                          • Part of subcall function 00F37562: VariantInit.OLEAUT32(00000000), ref: 00F375A2
                                                          • Part of subcall function 00F37562: VariantCopy.OLEAUT32(00000000,?), ref: 00F375AB
                                                          • Part of subcall function 00F37562: VariantClear.OLEAUT32(00000000), ref: 00F375B7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                        • API String ID: 4237274167-1221869570
                                                        • Opcode ID: 9dbdde52f3159aa88afe5a49ffc595807d5af14042549656d749399df90501be
                                                        • Instruction ID: 9eff17961ddce2f44ded378a40774e126b780fb319ad2d7111b14363579e3882
                                                        • Opcode Fuzzy Hash: 9dbdde52f3159aa88afe5a49ffc595807d5af14042549656d749399df90501be
                                                        • Instruction Fuzzy Hash: BA918F71A043019FC710DF24C88495EBBE4EF89754F14496EF89A9B362DB31ED06DB92
                                                        APIs
                                                          • Part of subcall function 00EEFC86: _wcscpy.LIBCMT ref: 00EEFCA9
                                                        • _memset.LIBCMT ref: 00F32B87
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F32BB6
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F32C69
                                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00F32C97
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                        • String ID: 0
                                                        • API String ID: 4152858687-4108050209
                                                        • Opcode ID: d3dd26d1f235da5bb8f428fd143a9dcc32c52570d2f642f2c3408c387c205c1b
                                                        • Instruction ID: 9bbdd5b26dd538e0c7ec2e44928d45fb14b9ec61f2152dd6472063caad6dc094
                                                        • Opcode Fuzzy Hash: d3dd26d1f235da5bb8f428fd143a9dcc32c52570d2f642f2c3408c387c205c1b
                                                        • Instruction Fuzzy Hash: 6E51DE71A083009BDBA59F28D845A6FB7E8EF853B0F141A2DF991E3291DB70CD04A752
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memmove$_free
                                                        • String ID: 3c$_
                                                        • API String ID: 2620147621-4099079164
                                                        • Opcode ID: 759580df80124e200fbccd0f8c56b726c4bbb87f3630610b5098cc3d5ccb541f
                                                        • Instruction ID: b6fc7d6fd9f65311c24623b71c7d0ccc4351d61ffb1aedf183b3064cc7275f24
                                                        • Opcode Fuzzy Hash: 759580df80124e200fbccd0f8c56b726c4bbb87f3630610b5098cc3d5ccb541f
                                                        • Instruction Fuzzy Hash: D9519B71A043858FDB24CF29C844B6EBBE5EF85314F04592DE999E7391EB31E941CB42
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memset$_memmove
                                                        • String ID: 3c$ERCP
                                                        • API String ID: 2532777613-1756721700
                                                        • Opcode ID: 7de2801853cb130c35da7899e220128079ab4b8c2c599b209d36e06ca560c0f1
                                                        • Instruction ID: bdeba601a69cf273f76ba3dc09b8c55f4964d8e868bed7b6e08e2d80658725a3
                                                        • Opcode Fuzzy Hash: 7de2801853cb130c35da7899e220128079ab4b8c2c599b209d36e06ca560c0f1
                                                        • Instruction Fuzzy Hash: 4F51D271900309DBDB24CF66C841BEAB7F4EF58354F20856EE94AEB251E770EA40CB40
                                                        APIs
                                                        • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00F2D5D4
                                                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00F2D60A
                                                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00F2D61B
                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00F2D69D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$AddressCreateInstanceProc
                                                        • String ID: DllGetClassObject
                                                        • API String ID: 753597075-1075368562
                                                        • Opcode ID: df892a7f5ceb9ed69e88e3bf35cd4e73e1bd95819922151752b638f3eece9e0a
                                                        • Instruction ID: 8328799abb59b0a66c9082ee5b2db135dd780115e4c149d6d349aa6929abc8ab
                                                        • Opcode Fuzzy Hash: df892a7f5ceb9ed69e88e3bf35cd4e73e1bd95819922151752b638f3eece9e0a
                                                        • Instruction Fuzzy Hash: 4241BFB1600214EFDB04DF64D884B9A7FAAEF44314F1581A9ED09DF246D7B4DD44EBA0
                                                        APIs
                                                        • _memset.LIBCMT ref: 00F327C0
                                                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00F327DC
                                                        • DeleteMenu.USER32(?,00000007,00000000), ref: 00F32822
                                                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00F95890,00000000), ref: 00F3286B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$InfoItem_memset
                                                        • String ID: 0
                                                        • API String ID: 1173514356-4108050209
                                                        • Opcode ID: 9e28e54efe157b349328f77165de98239bd7900e43385ff30194f1b46aef0f02
                                                        • Instruction ID: 72f3687fce4d28850b13304777ca8efb738aba80659260f9afc9b5a9dd9ea8d3
                                                        • Opcode Fuzzy Hash: 9e28e54efe157b349328f77165de98239bd7900e43385ff30194f1b46aef0f02
                                                        • Instruction Fuzzy Hash: A241BE716043019FDB60DF24CC84B2ABBE8EF85334F144A6EF9A697291D734E905DB62
                                                        APIs
                                                        • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00F4D7C5
                                                          • Part of subcall function 00ED784B: _memmove.LIBCMT ref: 00ED7899
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: BuffCharLower_memmove
                                                        • String ID: cdecl$none$stdcall$winapi
                                                        • API String ID: 3425801089-567219261
                                                        • Opcode ID: 491ad547228c9f579e5bca756351e11801f4071d1c510bf2c108087fcfe5da69
                                                        • Instruction ID: 56d4eea2240237b924548d625b09dae5d89c88bb96988c52d8eba8b24f6df116
                                                        • Opcode Fuzzy Hash: 491ad547228c9f579e5bca756351e11801f4071d1c510bf2c108087fcfe5da69
                                                        • Instruction Fuzzy Hash: E6317A71904619ABCF00EF58C9519FEB7F5FF04320B10866AE866A77D2DB71A906DB80
                                                        APIs
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                          • Part of subcall function 00F2AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F2AABC
                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00F28F14
                                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00F28F27
                                                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00F28F57
                                                          • Part of subcall function 00ED7BCC: _memmove.LIBCMT ref: 00ED7C06
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_memmove$ClassName
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 365058703-1403004172
                                                        • Opcode ID: 8b2b97225322fe19bfba50e06c41a0f8db9dd04028a01ac9c05e2cc806c46591
                                                        • Instruction ID: d796243cbbc9da050805adb63be32eed4bcacce56e829982e2b07b13afe4705b
                                                        • Opcode Fuzzy Hash: 8b2b97225322fe19bfba50e06c41a0f8db9dd04028a01ac9c05e2cc806c46591
                                                        • Instruction Fuzzy Hash: 44210472A01208BBDB14ABB0DC85DFFB7A9DF453A0F14411AF821A72E1DF39480AA610
                                                        APIs
                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F4184C
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F41872
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00F418A2
                                                        • InternetCloseHandle.WININET(00000000), ref: 00F418E9
                                                          • Part of subcall function 00F42483: GetLastError.KERNEL32(?,?,00F41817,00000000,00000000,00000001), ref: 00F42498
                                                          • Part of subcall function 00F42483: SetEvent.KERNEL32(?,?,00F41817,00000000,00000000,00000001), ref: 00F424AD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                        • String ID:
                                                        • API String ID: 3113390036-3916222277
                                                        • Opcode ID: 0d0b6184f590c467a6fab970dc13959d9a11a59dc65018885cfa9e20a44fe907
                                                        • Instruction ID: 319dba2816ca62c81204a03c4d85100d9395d78c95f7c8422b51749a0b7134b9
                                                        • Opcode Fuzzy Hash: 0d0b6184f590c467a6fab970dc13959d9a11a59dc65018885cfa9e20a44fe907
                                                        • Instruction Fuzzy Hash: 1421BEB150030CBFEB119B60DC85EBF7BEDFB48755F10412AF905A2240EA248D48B7A0
                                                        APIs
                                                          • Part of subcall function 00ED1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00ED1D73
                                                          • Part of subcall function 00ED1D35: GetStockObject.GDI32(00000011), ref: 00ED1D87
                                                          • Part of subcall function 00ED1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00ED1D91
                                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00F56461
                                                        • LoadLibraryW.KERNEL32(?), ref: 00F56468
                                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00F5647D
                                                        • DestroyWindow.USER32(?), ref: 00F56485
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                        • String ID: SysAnimate32
                                                        • API String ID: 4146253029-1011021900
                                                        • Opcode ID: 6f3d30c29dc216e54bcb266ecaf8ae3dc65b8578b0d5ea221ded151e702247fa
                                                        • Instruction ID: f04a738a926dcc0dbd4f2459d964ac4e1b2714c0ada79aad791e7c7f49198880
                                                        • Opcode Fuzzy Hash: 6f3d30c29dc216e54bcb266ecaf8ae3dc65b8578b0d5ea221ded151e702247fa
                                                        • Instruction Fuzzy Hash: 51217C71600209ABEF108F64DC80EBB77A9EB59375F904629FB20D3190D7759C45B760
                                                        APIs
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 00F36DBC
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F36DEF
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 00F36E01
                                                        • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00F36E3B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CreateHandle$FilePipe
                                                        • String ID: nul
                                                        • API String ID: 4209266947-2873401336
                                                        • Opcode ID: 171b51be50142e84b62fcd19e37d134f662f28b368163192d2d48631fe954553
                                                        • Instruction ID: 6099b1c527f6188aa82d5eda8b65ae3223dd2048bc546126943c94af4bd6be6a
                                                        • Opcode Fuzzy Hash: 171b51be50142e84b62fcd19e37d134f662f28b368163192d2d48631fe954553
                                                        • Instruction Fuzzy Hash: 13219275A00309BBDB209F29DC04A9A77F4EF45731F208629FDA0D72D0DB709955AB54
                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 00F36E89
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F36EBB
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 00F36ECC
                                                        • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00F36F06
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CreateHandle$FilePipe
                                                        • String ID: nul
                                                        • API String ID: 4209266947-2873401336
                                                        • Opcode ID: 76a639aed1812cd86b607b2e0d67b078b09e99a6916e292d9e87fb1839929b8b
                                                        • Instruction ID: ae743f726f30061657a76d2a1915fde461197930f87a106fedc957410c6207da
                                                        • Opcode Fuzzy Hash: 76a639aed1812cd86b607b2e0d67b078b09e99a6916e292d9e87fb1839929b8b
                                                        • Instruction Fuzzy Hash: 5C21B079900305EBDB209F69CC04A9A77E8AF45731F208A19F9A0D72D0DB70A898AB14
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00F3AC54
                                                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00F3ACA8
                                                        • __swprintf.LIBCMT ref: 00F3ACC1
                                                        • SetErrorMode.KERNEL32(00000000,00000001,00000000,00F5F910), ref: 00F3ACFF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume__swprintf
                                                        • String ID: %lu
                                                        • API String ID: 3164766367-685833217
                                                        • Opcode ID: 6dd4536d45ea16d2f6d1f053f57fe7c5e3bb7ccf5b1b4353a6b6076c38162e5a
                                                        • Instruction ID: 4622fb2dc3601fd8bdc012d27f64adbf7423b6e7495446df65f44f7897484f14
                                                        • Opcode Fuzzy Hash: 6dd4536d45ea16d2f6d1f053f57fe7c5e3bb7ccf5b1b4353a6b6076c38162e5a
                                                        • Instruction Fuzzy Hash: 44217135A00209AFCB10DF65CD45DAE7BF8EF89715B0040A9F909EB352DB31EA45DB61
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 00F31B19
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper
                                                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                        • API String ID: 3964851224-769500911
                                                        • Opcode ID: aa3eb11aaeda4b1fcf9b62ef7351ece236c1c0f54ddb095a7100e3980e46df72
                                                        • Instruction ID: e8ab55dcb50c58096b2ed3bbbb4ec8066ba4cca0e2695d7745ca6510a4995260
                                                        • Opcode Fuzzy Hash: aa3eb11aaeda4b1fcf9b62ef7351ece236c1c0f54ddb095a7100e3980e46df72
                                                        • Instruction Fuzzy Hash: C3115B719102088FCF00EFA4D9618FEF7B4FF66324F5484A9D814AB692EB325D06EB50
                                                        APIs
                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00F4EC07
                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00F4EC37
                                                        • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00F4ED6A
                                                        • CloseHandle.KERNEL32(?), ref: 00F4EDEB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                        • String ID:
                                                        • API String ID: 2364364464-0
                                                        • Opcode ID: 67ba89c1fa4bbce1360dfb1405204c70acb87c0a36d95ff7c88434c4d50fcc4d
                                                        • Instruction ID: 1dfefc5fc44005a40b6c64e6571ddd7f4a4e52f16700bdd1ef5b9498e0937209
                                                        • Opcode Fuzzy Hash: 67ba89c1fa4bbce1360dfb1405204c70acb87c0a36d95ff7c88434c4d50fcc4d
                                                        • Instruction Fuzzy Hash: 1C814E71A003009FD764EF28CC46B6AB7E5EF44720F14881EF999EB3D2D671AC419B52
                                                        APIs
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                          • Part of subcall function 00F50E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F4FDAD,?,?), ref: 00F50E31
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F500FD
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F5013C
                                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00F50183
                                                        • RegCloseKey.ADVAPI32(?,?), ref: 00F501AF
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 00F501BC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                                                        • String ID:
                                                        • API String ID: 3440857362-0
                                                        • Opcode ID: bd4c894190ba7641c276e195ef226c3ff94bba93790a0e35f1bb133093d5fa24
                                                        • Instruction ID: 59d9246261c28bb6458ae59bb1b37822f1c34b7796d500fcc0ebd6d9575e4c53
                                                        • Opcode Fuzzy Hash: bd4c894190ba7641c276e195ef226c3ff94bba93790a0e35f1bb133093d5fa24
                                                        • Instruction Fuzzy Hash: 96516971608304AFC704EF58CC81E6AB7E9FF84314F44492EFA95972A2DB31E909DB52
                                                        APIs
                                                          • Part of subcall function 00ED9837: __itow.LIBCMT ref: 00ED9862
                                                          • Part of subcall function 00ED9837: __swprintf.LIBCMT ref: 00ED98AC
                                                        • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00F4D927
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00F4D9AA
                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00F4D9C6
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00F4DA07
                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00F4DA21
                                                          • Part of subcall function 00ED5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00F37896,?,?,00000000), ref: 00ED5A2C
                                                          • Part of subcall function 00ED5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00F37896,?,?,00000000,?,?), ref: 00ED5A50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 327935632-0
                                                        • Opcode ID: d2d38b2f0cceeb528d5c8944d10a137f692e2e21f5b83f336e99a2d7ba92804e
                                                        • Instruction ID: a71999c8e22c174f5aaeda412b058a62fbfca48676eddfc4f1253bcb1b4e2208
                                                        • Opcode Fuzzy Hash: d2d38b2f0cceeb528d5c8944d10a137f692e2e21f5b83f336e99a2d7ba92804e
                                                        • Instruction Fuzzy Hash: 0D512A35A00609DFCB00EFA8C8849ADBBF5FF09324B1580A6E955AB312D735ED46DF91
                                                        APIs
                                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00F3E61F
                                                        • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00F3E648
                                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00F3E687
                                                          • Part of subcall function 00ED9837: __itow.LIBCMT ref: 00ED9862
                                                          • Part of subcall function 00ED9837: __swprintf.LIBCMT ref: 00ED98AC
                                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00F3E6AC
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00F3E6B4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                        • String ID:
                                                        • API String ID: 1389676194-0
                                                        • Opcode ID: 8ff9657bb52e784af114aa727ca22da0f3ed7d6dadc09effe70c34ff030e79da
                                                        • Instruction ID: a9bdb0fc4bf66998b8ec9853154b1e7fec8b68d2db019bdf5d1000c0b0bc27fc
                                                        • Opcode Fuzzy Hash: 8ff9657bb52e784af114aa727ca22da0f3ed7d6dadc09effe70c34ff030e79da
                                                        • Instruction Fuzzy Hash: 8D510C79A00209DFCB05EF64C9819AEBBF5EF09314F1480A5E909AB362CB31ED55DF50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: f55db90634ecc4d9292b932cc2187916b799e630b371e5cc3ccd483869b35e43
                                                        • Instruction ID: e165217159b34888aa19289bf05706b7a76da23c3a4e64a6b7914efaddbd71de
                                                        • Opcode Fuzzy Hash: f55db90634ecc4d9292b932cc2187916b799e630b371e5cc3ccd483869b35e43
                                                        • Instruction Fuzzy Hash: A141A335D04608AFD721DF28CC48FA9BBA4EB09322F150365FE15A72E1DB309D69FA51
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00ED2357
                                                        • ScreenToClient.USER32(00F957B0,?), ref: 00ED2374
                                                        • GetAsyncKeyState.USER32(00000001), ref: 00ED2399
                                                        • GetAsyncKeyState.USER32(00000002), ref: 00ED23A7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: AsyncState$ClientCursorScreen
                                                        • String ID:
                                                        • API String ID: 4210589936-0
                                                        • Opcode ID: 0e2f8e419c13ee4b2963653e2d930d4b37083e7cb9b69ee865d8d4ad7788041e
                                                        • Instruction ID: f616b67dee696c5a330b16203c25d9c37e946f504cba9a261dbaaeb637f969e7
                                                        • Opcode Fuzzy Hash: 0e2f8e419c13ee4b2963653e2d930d4b37083e7cb9b69ee865d8d4ad7788041e
                                                        • Instruction Fuzzy Hash: AE419D35A0420AFBCF159F68CC44AE9BB74FB15324F20435AF928A22A0C7359954EB91
                                                        APIs
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F263E7
                                                        • TranslateAcceleratorW.USER32(?,?,?), ref: 00F26433
                                                        • TranslateMessage.USER32(?), ref: 00F2645C
                                                        • DispatchMessageW.USER32(?), ref: 00F26466
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F26475
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Message$PeekTranslate$AcceleratorDispatch
                                                        • String ID:
                                                        • API String ID: 2108273632-0
                                                        • Opcode ID: 16dd7a1db407f1a62cfea5f23651632d2275afa76a26e0228c16edaf46a3ad96
                                                        • Instruction ID: a6851131f4271cb6b1f9739411e58f9ce3cdaf22c697ce0b7f9f9e50c1220728
                                                        • Opcode Fuzzy Hash: 16dd7a1db407f1a62cfea5f23651632d2275afa76a26e0228c16edaf46a3ad96
                                                        • Instruction Fuzzy Hash: 4831E831D0066AEFDB25DFB0EC44BB67BACAB01720F140166E561C71A1E7359889F761
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00F28A30
                                                        • PostMessageW.USER32(?,00000201,00000001), ref: 00F28ADA
                                                        • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00F28AE2
                                                        • PostMessageW.USER32(?,00000202,00000000), ref: 00F28AF0
                                                        • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00F28AF8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleep$RectWindow
                                                        • String ID:
                                                        • API String ID: 3382505437-0
                                                        • Opcode ID: 6a918bc73e14557ccc074670d20caa1b32be73f20cd811e052e9739b9d85cfb7
                                                        • Instruction ID: 18a8c0d8665a8c89b47fde52c7cb3258646e99746e3032a67f070ea7aaca060b
                                                        • Opcode Fuzzy Hash: 6a918bc73e14557ccc074670d20caa1b32be73f20cd811e052e9739b9d85cfb7
                                                        • Instruction Fuzzy Hash: 4B31F171901229EBCB00CFA8E94CA9E3BB5EB05326F104229F925E71D0CBB49915EF90
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 00F2B204
                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00F2B221
                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00F2B259
                                                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00F2B27F
                                                        • _wcsstr.LIBCMT ref: 00F2B289
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                        • String ID:
                                                        • API String ID: 3902887630-0
                                                        • Opcode ID: 6eef3e87e0f62ef317561a973e44b15df8452716bf60ca72591845de82f70877
                                                        • Instruction ID: 7adc288e390a0512b98b21bdaf411644fbb972d703f4d70b5d4e8bf8e22e9810
                                                        • Opcode Fuzzy Hash: 6eef3e87e0f62ef317561a973e44b15df8452716bf60ca72591845de82f70877
                                                        • Instruction Fuzzy Hash: E921F532604314BBEB169B75AC09E7F7B98DF49720F104169FD04DA1A1EB619C40A2A0
                                                        APIs
                                                          • Part of subcall function 00ED2612: GetWindowLongW.USER32(?,000000EB), ref: 00ED2623
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00F5B192
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00F5B1B7
                                                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00F5B1CF
                                                        • GetSystemMetrics.USER32(00000004), ref: 00F5B1F8
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00F40E90,00000000), ref: 00F5B216
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$MetricsSystem
                                                        • String ID:
                                                        • API String ID: 2294984445-0
                                                        • Opcode ID: 1053d6c2ecb0075f5243537316df05e15918da4c84803f5e3c048573b4252723
                                                        • Instruction ID: 7c104a7b9e936134136c9c0ae92b9475e07768ee459ecca87e553cae2a9c7548
                                                        • Opcode Fuzzy Hash: 1053d6c2ecb0075f5243537316df05e15918da4c84803f5e3c048573b4252723
                                                        • Instruction Fuzzy Hash: 49218071910659AFCB219F38DC18A6A3BA4EB05772F144729BE32D71E0E7309815EB90
                                                        APIs
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00F29320
                                                          • Part of subcall function 00ED7BCC: _memmove.LIBCMT ref: 00ED7C06
                                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00F29352
                                                        • __itow.LIBCMT ref: 00F2936A
                                                        • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00F29392
                                                        • __itow.LIBCMT ref: 00F293A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$__itow$_memmove
                                                        • String ID:
                                                        • API String ID: 2983881199-0
                                                        • Opcode ID: 4d81f31901b120caf491cfdf1dae9e10df67791534cb9a90f2b7d398c1422ed0
                                                        • Instruction ID: db0eecd88e1991646e9173bf2661897e3e24bb87f5a029f9b715911329c2af23
                                                        • Opcode Fuzzy Hash: 4d81f31901b120caf491cfdf1dae9e10df67791534cb9a90f2b7d398c1422ed0
                                                        • Instruction Fuzzy Hash: A121DA31B042186BDB10EBA49C85EEE7BEDEB48720F045025FE45E72D1D6F0CD45A7A1
                                                        APIs
                                                        • IsWindow.USER32(00000000), ref: 00F45A6E
                                                        • GetForegroundWindow.USER32 ref: 00F45A85
                                                        • GetDC.USER32(00000000), ref: 00F45AC1
                                                        • GetPixel.GDI32(00000000,?,00000003), ref: 00F45ACD
                                                        • ReleaseDC.USER32(00000000,00000003), ref: 00F45B08
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$ForegroundPixelRelease
                                                        • String ID:
                                                        • API String ID: 4156661090-0
                                                        • Opcode ID: 117b28ab729fea1e8aab302d7f6e03f5c6ea37f3f4622e73435199ecb958acf8
                                                        • Instruction ID: b4f6b3159fcd289e20077579927cfff18d4aa164e891be012a186d3de0a4f402
                                                        • Opcode Fuzzy Hash: 117b28ab729fea1e8aab302d7f6e03f5c6ea37f3f4622e73435199ecb958acf8
                                                        • Instruction Fuzzy Hash: B421C335A00208AFD704EF64DC88AAABBF5EF48751F148079F909D7362CB74AC05EB90
                                                        APIs
                                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00ED134D
                                                        • SelectObject.GDI32(?,00000000), ref: 00ED135C
                                                        • BeginPath.GDI32(?), ref: 00ED1373
                                                        • SelectObject.GDI32(?,00000000), ref: 00ED139C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: bf5de03a9118bb5131061d077f323262dfd72aedd66ac0984c5635c60dd786e4
                                                        • Instruction ID: 56622374084a9d2849e63f4dba13a9115e37d50d9a09fd85916ca989906dc846
                                                        • Opcode Fuzzy Hash: bf5de03a9118bb5131061d077f323262dfd72aedd66ac0984c5635c60dd786e4
                                                        • Instruction Fuzzy Hash: A2213E3080170CEFDB129F25DC4476D7BA8EB10B26F194297F911A62B0D7719996EF90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: 6db85577dcd2145786bbc04e1d5041c7fcae9a333a588cd077a885d85689e4c9
                                                        • Instruction ID: 9fdd38f7d2a765346e77fdd9bcb6e6220e71b18767d37e0c8bfc6403443608ed
                                                        • Opcode Fuzzy Hash: 6db85577dcd2145786bbc04e1d5041c7fcae9a333a588cd077a885d85689e4c9
                                                        • Instruction Fuzzy Hash: 8C01B57264152DBBD2046B117D42FFBB75CDE713A8B044021FE15A6383EB51DE10A2A1
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 00F34ABA
                                                        • __beginthreadex.LIBCMT ref: 00F34AD8
                                                        • MessageBoxW.USER32(?,?,?,?), ref: 00F34AED
                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00F34B03
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00F34B0A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                                                        • String ID:
                                                        • API String ID: 3824534824-0
                                                        • Opcode ID: be3c2edec0bf4aa0f29e487b0ef8bc2a36c00e928f8a4199942710aa89290d19
                                                        • Instruction ID: 70ae6f6e1cf9c4c469f71112efea9dd52949c2446672252aaaea433747e8b8e2
                                                        • Opcode Fuzzy Hash: be3c2edec0bf4aa0f29e487b0ef8bc2a36c00e928f8a4199942710aa89290d19
                                                        • Instruction Fuzzy Hash: 9411047690570CBBC7019FB8AC08A9B7FACEB85331F1442AAF914D3250D671E904ABA0
                                                        APIs
                                                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F2821E
                                                        • GetLastError.KERNEL32(?,00F27CE2,?,?,?), ref: 00F28228
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00F27CE2,?,?,?), ref: 00F28237
                                                        • HeapAlloc.KERNEL32(00000000,?,00F27CE2,?,?,?), ref: 00F2823E
                                                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F28255
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 842720411-0
                                                        • Opcode ID: c8d1300fea7ab1671d0d8ac6a90d5f2cc72beddc9f712f27f31d6c88870cae9c
                                                        • Instruction ID: b4cad7cae34bbde921f6487bb7e482c1063faa5e9cabac3bbee4bfd86cc1122a
                                                        • Opcode Fuzzy Hash: c8d1300fea7ab1671d0d8ac6a90d5f2cc72beddc9f712f27f31d6c88870cae9c
                                                        • Instruction Fuzzy Hash: 6E016271601718FFDB104FA5EC48D6B7B6CEF857A57500469F909C3160DA318C05EA60
                                                        APIs
                                                        • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F27044,80070057,?,?,?,00F27455), ref: 00F27127
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F27044,80070057,?,?), ref: 00F27142
                                                        • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F27044,80070057,?,?), ref: 00F27150
                                                        • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F27044,80070057,?), ref: 00F27160
                                                        • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00F27044,80070057,?,?), ref: 00F2716C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: From$Prog$FreeStringTasklstrcmpi
                                                        • String ID:
                                                        • API String ID: 3897988419-0
                                                        • Opcode ID: 180348b366163e6bcba542d08907999aaf970d1e20576e54a63d77e38e4f3a8c
                                                        • Instruction ID: a967f9d22dd035f97dddb25b28af1b6b04163468b89b16b764ab483c9fb7992b
                                                        • Opcode Fuzzy Hash: 180348b366163e6bcba542d08907999aaf970d1e20576e54a63d77e38e4f3a8c
                                                        • Instruction Fuzzy Hash: 96018472A01328BBDB115F64EC44BAA7BADEF44763F1400A4FE04D2260D731DD50ABA0
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F35260
                                                        • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00F3526E
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F35276
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00F35280
                                                        • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F352BC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                        • String ID:
                                                        • API String ID: 2833360925-0
                                                        • Opcode ID: 28c87e0b4f8259df83cc647d7ae139f10474a29d3342d199349e80ebd32b06f7
                                                        • Instruction ID: c025e873d1226743e56895dc9e2dfb9889dd42339d3717ec7814037a0e6d1a9d
                                                        • Opcode Fuzzy Hash: 28c87e0b4f8259df83cc647d7ae139f10474a29d3342d199349e80ebd32b06f7
                                                        • Instruction Fuzzy Hash: 49012971D01A1DDBCF00EFE4EC49AEEBB78FB49B22F400596EA45B2191CB309554A7A1
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F28121
                                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F2812B
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F2813A
                                                        • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F28141
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F28157
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 44706859-0
                                                        • Opcode ID: a68df41e5afafd05af5024f4985186ca5f915879a610f998b28d6fee8e78180c
                                                        • Instruction ID: 22a2a5506358aac62217277715b37db35b2a540d7bd84f0d58e4c12d412fbf85
                                                        • Opcode Fuzzy Hash: a68df41e5afafd05af5024f4985186ca5f915879a610f998b28d6fee8e78180c
                                                        • Instruction Fuzzy Hash: 99F06271602328AFEB110FA5EC8DE6B3BACFF497A5B040065FA45C7190CB619D56EA60
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00F2C1F7
                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00F2C20E
                                                        • MessageBeep.USER32(00000000), ref: 00F2C226
                                                        • KillTimer.USER32(?,0000040A), ref: 00F2C242
                                                        • EndDialog.USER32(?,00000001), ref: 00F2C25C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                        • String ID:
                                                        • API String ID: 3741023627-0
                                                        • Opcode ID: 16c20c5bcd9057950e95b6fd206f53e52e04a13a6cabff10c790e3e6c62e8a63
                                                        • Instruction ID: 9148bd8207d60d0e18c2a1ad56f5fc1b624a5f4f7a312f6b4cd82280bd23bb17
                                                        • Opcode Fuzzy Hash: 16c20c5bcd9057950e95b6fd206f53e52e04a13a6cabff10c790e3e6c62e8a63
                                                        • Instruction Fuzzy Hash: CB018B30904718D7EB206B64FD4EF9677B8FF00706F0006A9F682A14E1DBF46958AB91
                                                        APIs
                                                        • EndPath.GDI32(?), ref: 00ED13BF
                                                        • StrokeAndFillPath.GDI32(?,?,00F0B888,00000000,?), ref: 00ED13DB
                                                        • SelectObject.GDI32(?,00000000), ref: 00ED13EE
                                                        • DeleteObject.GDI32 ref: 00ED1401
                                                        • StrokePath.GDI32(?), ref: 00ED141C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                        • String ID:
                                                        • API String ID: 2625713937-0
                                                        • Opcode ID: fc552860424221b2bb9ba683bc34cbf2ae4547a46dfc8eb9c63d0bd7b2c61c5b
                                                        • Instruction ID: 429c4c674904d8b2822f29dffadb70eecda662df95555790cb8809e6b5ea1da4
                                                        • Opcode Fuzzy Hash: fc552860424221b2bb9ba683bc34cbf2ae4547a46dfc8eb9c63d0bd7b2c61c5b
                                                        • Instruction Fuzzy Hash: 47F0E730405B0CEBDB125F26EC4C7583FA4EB0172AF0892A6E529991F1C731899AEF50
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 00F3C432
                                                        • CoCreateInstance.OLE32(00F62D6C,00000000,00000001,00F62BDC,?), ref: 00F3C44A
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                        • CoUninitialize.OLE32 ref: 00F3C6B7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize_memmove
                                                        • String ID: .lnk
                                                        • API String ID: 2683427295-24824748
                                                        • Opcode ID: 3b0c25a0fa0e528823c5e39f1fd21e5f661f5020ba13052bddf2f2b78dc30a98
                                                        • Instruction ID: a304b17215e65cc66e935acf2a52514d58b8876022353c4150569a07dd36b25c
                                                        • Opcode Fuzzy Hash: 3b0c25a0fa0e528823c5e39f1fd21e5f661f5020ba13052bddf2f2b78dc30a98
                                                        • Instruction Fuzzy Hash: 0AA13A71104205AFD700EF54CC91EAFB7E8EF95354F00491DF595AB2A2EB71EA0ACB62
                                                        APIs
                                                          • Part of subcall function 00EF0DB6: std::exception::exception.LIBCMT ref: 00EF0DEC
                                                          • Part of subcall function 00EF0DB6: __CxxThrowException@8.LIBCMT ref: 00EF0E01
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                          • Part of subcall function 00ED7A51: _memmove.LIBCMT ref: 00ED7AAB
                                                        • __swprintf.LIBCMT ref: 00EE2ECD
                                                        Strings
                                                        • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00EE2D66
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                                                        • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                        • API String ID: 1943609520-557222456
                                                        • Opcode ID: 4f39dfd3ee45ff17ff33575ae15bdf1b9216982f104dab480f4f12c7be3e263e
                                                        • Instruction ID: 5e95371f3e4e559215e746b16c5714ddb8154f8b0b6027ad6ee7074a358f9e7f
                                                        • Opcode Fuzzy Hash: 4f39dfd3ee45ff17ff33575ae15bdf1b9216982f104dab480f4f12c7be3e263e
                                                        • Instruction Fuzzy Hash: 72918C725082559FC714EF24C895CAEB7E8EF85310F00691EF595EB2A2EB30ED45CB52
                                                        APIs
                                                          • Part of subcall function 00ED4750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00ED4743,?,?,00ED37AE,?), ref: 00ED4770
                                                        • CoInitialize.OLE32(00000000), ref: 00F3B9BB
                                                        • CoCreateInstance.OLE32(00F62D6C,00000000,00000001,00F62BDC,?), ref: 00F3B9D4
                                                        • CoUninitialize.OLE32 ref: 00F3B9F1
                                                          • Part of subcall function 00ED9837: __itow.LIBCMT ref: 00ED9862
                                                          • Part of subcall function 00ED9837: __swprintf.LIBCMT ref: 00ED98AC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                        • String ID: .lnk
                                                        • API String ID: 2126378814-24824748
                                                        • Opcode ID: 478a11413312538f0fafed7c4c37c24fc7197d0e301e206a8a586460c78cba4d
                                                        • Instruction ID: 8bef61089999538da7f82e42e4d9ac55957cb85a69b2129c9d3831c376926429
                                                        • Opcode Fuzzy Hash: 478a11413312538f0fafed7c4c37c24fc7197d0e301e206a8a586460c78cba4d
                                                        • Instruction Fuzzy Hash: 2AA18A75A043059FCB04DF14C894D2ABBE5FF89324F048989F9999B3A2CB31EC46DB91
                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 00EF50AD
                                                          • Part of subcall function 00F000F0: __87except.LIBCMT ref: 00F0012B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ErrorHandling__87except__start
                                                        • String ID: pow
                                                        • API String ID: 2905807303-2276729525
                                                        • Opcode ID: a7502f03be534e5884a10857306f7cc4f0afd8a0a8ecb0b959e19940fc954a49
                                                        • Instruction ID: 7d75c5fd86fe2d4a2542838db69f5e2d61f14f16ce3f586646a23a3c03c2d0d8
                                                        • Opcode Fuzzy Hash: a7502f03be534e5884a10857306f7cc4f0afd8a0a8ecb0b959e19940fc954a49
                                                        • Instruction Fuzzy Hash: 6351AA32E0DA0AC6DB117724CC0137E3BD49B60314F208D99E6D5962E9EF388DC4BB86
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memmove
                                                        • String ID: 3c$_
                                                        • API String ID: 4104443479-4099079164
                                                        • Opcode ID: 13749348f3b1f02bb50c20d8f82ad8e31d923af4cf780b541a7935a1ea1d678c
                                                        • Instruction ID: ef241fee581034b166d2a6780ca4b0859ae6f30b47f7d6d7bc84d1ef061b224b
                                                        • Opcode Fuzzy Hash: 13749348f3b1f02bb50c20d8f82ad8e31d923af4cf780b541a7935a1ea1d678c
                                                        • Instruction Fuzzy Hash: 7F514DB0D00609DFCB24CF68C984AEEB7B1FF44354F148529E85AE7250EB31A996DB51
                                                        APIs
                                                          • Part of subcall function 00F314BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F29296,?,?,00000034,00000800,?,00000034), ref: 00F314E6
                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00F2983F
                                                          • Part of subcall function 00F31487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F292C5,?,?,00000800,?,00001073,00000000,?,?), ref: 00F314B1
                                                          • Part of subcall function 00F313DE: GetWindowThreadProcessId.USER32(?,?), ref: 00F31409
                                                          • Part of subcall function 00F313DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00F2925A,00000034,?,?,00001004,00000000,00000000), ref: 00F31419
                                                          • Part of subcall function 00F313DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00F2925A,00000034,?,?,00001004,00000000,00000000), ref: 00F3142F
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F298AC
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F298F9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                        • String ID: @
                                                        • API String ID: 4150878124-2766056989
                                                        • Opcode ID: 8d1b165bc5b1f9168588a76c9084715056720429f2c98dbe694a5d34c15ec766
                                                        • Instruction ID: f6fa74e16f4915e6b43700b3b474cf0b5455e9d100a845eb0a2629da1d1f5821
                                                        • Opcode Fuzzy Hash: 8d1b165bc5b1f9168588a76c9084715056720429f2c98dbe694a5d34c15ec766
                                                        • Instruction Fuzzy Hash: D0413E7690121CAFDB10DFA4CD81ADEBBB8EB09310F004199FA45B7191DA756E89DBA0
                                                        APIs
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00F5F910,00000000,?,?,?,?), ref: 00F579DF
                                                        • GetWindowLongW.USER32 ref: 00F579FC
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F57A0C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID: SysTreeView32
                                                        • API String ID: 847901565-1698111956
                                                        • Opcode ID: 618c38aa476090a0b946eba8db52f63d3acfd338c484187ca76761bf4dac11f0
                                                        • Instruction ID: 11077aeb9a678892847107b9cfc980f74f99fccb754f7a62e976ad90dcc4e9f7
                                                        • Opcode Fuzzy Hash: 618c38aa476090a0b946eba8db52f63d3acfd338c484187ca76761bf4dac11f0
                                                        • Instruction Fuzzy Hash: 9C31103160420AABDB119E38DC01BEA37A9EF05331F204725FA75A32E0D730ED55AB60
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00F57461
                                                        • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00F57475
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F57499
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window
                                                        • String ID: SysMonthCal32
                                                        • API String ID: 2326795674-1439706946
                                                        • Opcode ID: 5305c300da864a64a31eac63bd92267edce4d106014f1861ed61bf6d7dd613ff
                                                        • Instruction ID: 146ddddc814fe771ab78963ddf39155f028e3048d285860f5cebe5fb2e50ea39
                                                        • Opcode Fuzzy Hash: 5305c300da864a64a31eac63bd92267edce4d106014f1861ed61bf6d7dd613ff
                                                        • Instruction Fuzzy Hash: 1F219F32500218ABDF11DFA4DC46FEA3BAAEB48725F110214FF156B190DAB5AC55EBA0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00F57C4A
                                                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00F57C58
                                                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00F57C5F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyWindow
                                                        • String ID: msctls_updown32
                                                        • API String ID: 4014797782-2298589950
                                                        • Opcode ID: e42d26403d21f6760e4e30172deee4b4c714e5f28c042bf67dfcd20f6f7c29ff
                                                        • Instruction ID: 3058382104b52ea0168729197e4818c5f321c9ea50f3aa7ee82ade022cf4a0c0
                                                        • Opcode Fuzzy Hash: e42d26403d21f6760e4e30172deee4b4c714e5f28c042bf67dfcd20f6f7c29ff
                                                        • Instruction Fuzzy Hash: D9217FB1604208AFDB11EF28DCC5DA737ECEB4A365B140059FA019B3A1CB31EC05AB60
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00F56D3B
                                                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00F56D4B
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00F56D70
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MoveWindow
                                                        • String ID: Listbox
                                                        • API String ID: 3315199576-2633736733
                                                        • Opcode ID: f9c61e924b63cf6bd5cef3d9c96d2888120b72d78890ed020621b8879b305f2f
                                                        • Instruction ID: 7bb720b5088d9e4e0a4dcbd6c8d54d054d8c17267108823f2c76da1df1b51e44
                                                        • Opcode Fuzzy Hash: f9c61e924b63cf6bd5cef3d9c96d2888120b72d78890ed020621b8879b305f2f
                                                        • Instruction Fuzzy Hash: BD21D432A00118BFDF118F54CC45FBB3BBAEF89762F418124FE559B1A0CA719C55ABA0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00F57772
                                                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00F57787
                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00F57794
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: msctls_trackbar32
                                                        • API String ID: 3850602802-1010561917
                                                        • Opcode ID: 9c07a67ad7d189f2110ac7f20e6ccb62c236e42e7c018859a332b46990517f97
                                                        • Instruction ID: 094cfd80d9791684f46baa7b8b2c51d9b51e1371423f0a163e6d6df2e15fda48
                                                        • Opcode Fuzzy Hash: 9c07a67ad7d189f2110ac7f20e6ccb62c236e42e7c018859a332b46990517f97
                                                        • Instruction Fuzzy Hash: DD112772604308BAEF106F60EC05FEB37A9EF88B65F010118FB41A2090D671E811EB10
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00ED4B83,?), ref: 00ED4C44
                                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00ED4C56
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                        • API String ID: 2574300362-1355242751
                                                        • Opcode ID: 9770454cb2364071675478accf95779d7ef423153edc57bbb1262dc387b5587c
                                                        • Instruction ID: c9401b1128928d555ccec6b2ff807f2f1ec9c716a9d836eff1902c29a751dd41
                                                        • Opcode Fuzzy Hash: 9770454cb2364071675478accf95779d7ef423153edc57bbb1262dc387b5587c
                                                        • Instruction Fuzzy Hash: 2BD0C270510B13CFD7205F31C908606B3D4AF0134AB10887A9591D66A0E670C484D651
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,00ED4BD0,?,00ED4DEF,?,00F952F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00ED4C11
                                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00ED4C23
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                        • API String ID: 2574300362-3689287502
                                                        • Opcode ID: 54afe9bb849d67afd1dc57a12b2f5bab53dfca24ae77815d84443d1b50ade09b
                                                        • Instruction ID: 086d39ad745dfda567acfd2bc8be1e9d7f40eb72442bcad50c4dad8be3a44dec
                                                        • Opcode Fuzzy Hash: 54afe9bb849d67afd1dc57a12b2f5bab53dfca24ae77815d84443d1b50ade09b
                                                        • Instruction Fuzzy Hash: F7D0C270510B13CFD7206F70CA48606B6D5EF0934AB008C7A9481D6290E7B0C485DB51
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(advapi32.dll,?,00F51039), ref: 00F50DF5
                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00F50E07
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 2574300362-4033151799
                                                        • Opcode ID: 9a4d5839318afc0c3190b30e93bd51a41053de0edfd22565b7f86bae47b9f55f
                                                        • Instruction ID: c6657912f895d1f8bc7c360074788088d373dcf2ce604c00b2a643df6ca21912
                                                        • Opcode Fuzzy Hash: 9a4d5839318afc0c3190b30e93bd51a41053de0edfd22565b7f86bae47b9f55f
                                                        • Instruction Fuzzy Hash: BDD0C730800B26CFC321AF70C80A28272E4AF00363F288C3E9A82C6150EBB0D894EB40
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00F48CF4,?,00F5F910), ref: 00F490EE
                                                        • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00F49100
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: AddressLibraryLoadProc
                                                        • String ID: GetModuleHandleExW$kernel32.dll
                                                        • API String ID: 2574300362-199464113
                                                        • Opcode ID: 13d05a7398fef1fa3a1b6d165ed239fdd1adb95f0afe6b03cd833161c896c56e
                                                        • Instruction ID: 638cc09cb21c84da2cb65e95cba8893914ac739dbb4acda27073d671667e9467
                                                        • Opcode Fuzzy Hash: 13d05a7398fef1fa3a1b6d165ed239fdd1adb95f0afe6b03cd833161c896c56e
                                                        • Instruction Fuzzy Hash: BED01234A14713DFD7209F31D81854776D4AF45356B11887A9A86D6550E6B0C484E791
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: LocalTime__swprintf
                                                        • String ID: %.3d$WIN_XPe
                                                        • API String ID: 2070861257-2409531811
                                                        • Opcode ID: 6ef304e81ef7c90450027b87f6f35c7a84a001c6c0832daa5a03dcc449e64d3c
                                                        • Instruction ID: ac63de0a80bdd7f761d3cbbde7190d45a2026c464d47ffb2fad2548f7a12bfd4
                                                        • Opcode Fuzzy Hash: 6ef304e81ef7c90450027b87f6f35c7a84a001c6c0832daa5a03dcc449e64d3c
                                                        • Instruction Fuzzy Hash: F1D0127280910DEACB009A90988C9F9777CB718301F141452FB02E2280E221C7D9F621
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: ab0d728a7cd06ea076bd1de4820d79fc2a1e704d8d22dc2302378cb48afd58a9
                                                        • Instruction ID: 05d508fa2e5763d17fb730efaed75229ea46da4a584a0a2911fd073e21aeb829
                                                        • Opcode Fuzzy Hash: ab0d728a7cd06ea076bd1de4820d79fc2a1e704d8d22dc2302378cb48afd58a9
                                                        • Instruction Fuzzy Hash: 10C18075A04326EFCB14EF94D884EAEBBB5FF48314B148598E805EB251D730ED81EB90
                                                        APIs
                                                        • CharLowerBuffW.USER32(?,?), ref: 00F4E0BE
                                                        • CharLowerBuffW.USER32(?,?), ref: 00F4E101
                                                          • Part of subcall function 00F4D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00F4D7C5
                                                        • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00F4E301
                                                        • _memmove.LIBCMT ref: 00F4E314
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: BuffCharLower$AllocVirtual_memmove
                                                        • String ID:
                                                        • API String ID: 3659485706-0
                                                        • Opcode ID: cf5a1920bb684b7c870dceaaab9919791d6bf298a2abf7d7106cb5a07a77d713
                                                        • Instruction ID: 1fa97134e6011d610212ad421fa68a31cfdb64fba410ebd7619f415b11c8ec4c
                                                        • Opcode Fuzzy Hash: cf5a1920bb684b7c870dceaaab9919791d6bf298a2abf7d7106cb5a07a77d713
                                                        • Instruction Fuzzy Hash: 62C15B71A043019FC714DF28C480A6ABBE4FF89724F14896EF9999B352D771E946CB81
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 00F480C3
                                                        • CoUninitialize.OLE32 ref: 00F480CE
                                                          • Part of subcall function 00F2D56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00F2D5D4
                                                        • VariantInit.OLEAUT32(?), ref: 00F480D9
                                                        • VariantClear.OLEAUT32(?), ref: 00F483AA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                        • String ID:
                                                        • API String ID: 780911581-0
                                                        • Opcode ID: c99f47cd4906b715bf8599925230502361f749eeaf71ce9665adf209718aa622
                                                        • Instruction ID: 2e69e5c77cb1c44881f962701125ce813212d218045cea44aadb23f7d88a3954
                                                        • Opcode Fuzzy Hash: c99f47cd4906b715bf8599925230502361f749eeaf71ce9665adf209718aa622
                                                        • Instruction Fuzzy Hash: 02A136756047019FDB04DF14C881A2EBBE4FF89764F144449F996AB3A2CB74ED06EB82
                                                        APIs
                                                        • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00F62C7C,?), ref: 00F276EA
                                                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00F62C7C,?), ref: 00F27702
                                                        • CLSIDFromProgID.OLE32(?,?,00000000,00F5FB80,000000FF,?,00000000,00000800,00000000,?,00F62C7C,?), ref: 00F27727
                                                        • _memcmp.LIBCMT ref: 00F27748
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: FromProg$FreeTask_memcmp
                                                        • String ID:
                                                        • API String ID: 314563124-0
                                                        • Opcode ID: c3cb877b5e93c112ad9c813bd10b89d2306b8f8de70d4f67cddcdcf2dfcb2f51
                                                        • Instruction ID: a617d2a7aecc20236d4863ffdf7617926955a7ecfff20635f011a6287a5bbc32
                                                        • Opcode Fuzzy Hash: c3cb877b5e93c112ad9c813bd10b89d2306b8f8de70d4f67cddcdcf2dfcb2f51
                                                        • Instruction Fuzzy Hash: C4813D71A00219EFCB04DFA4C984EEEB7B9FF89315F204198F505AB250DB71AE06DB60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Variant$AllocClearCopyInitString
                                                        • String ID:
                                                        • API String ID: 2808897238-0
                                                        • Opcode ID: 6fb977e56acd2afa5a04a549d12a0809e24b94d70622e763488cebbe49c8f367
                                                        • Instruction ID: b5b888c14339d2f22aa7fe9e9872e22124e1074507bd84854007785da373d4d5
                                                        • Opcode Fuzzy Hash: 6fb977e56acd2afa5a04a549d12a0809e24b94d70622e763488cebbe49c8f367
                                                        • Instruction Fuzzy Hash: 4751C675B003159ACB24EF65E8A173AB3E5EF45310F20D81FE586EB291DB38DC81AB01
                                                        APIs
                                                        • GetWindowRect.USER32(0179E970,?), ref: 00F59863
                                                        • ScreenToClient.USER32(00000002,00000002), ref: 00F59896
                                                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00F59903
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientMoveRectScreen
                                                        • String ID:
                                                        • API String ID: 3880355969-0
                                                        • Opcode ID: 1f2131f64f1bb7eb985f1d6ba551d793c80bded67f42bece7cb9762a1e9ff215
                                                        • Instruction ID: 4199bef3dc17712b1a5cc3c30164a66e968e656575c348fd4954690a2f57e32b
                                                        • Opcode Fuzzy Hash: 1f2131f64f1bb7eb985f1d6ba551d793c80bded67f42bece7cb9762a1e9ff215
                                                        • Instruction Fuzzy Hash: 9A514D34A04208EFCF14CF64C884AAE7BB5FF45362F548159FA659B2A0D770AD85EB90
                                                        APIs
                                                        • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00F29AD2
                                                        • __itow.LIBCMT ref: 00F29B03
                                                          • Part of subcall function 00F29D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00F29DBE
                                                        • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00F29B6C
                                                        • __itow.LIBCMT ref: 00F29BC3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$__itow
                                                        • String ID:
                                                        • API String ID: 3379773720-0
                                                        • Opcode ID: e3b057c2b9a2fb5080336cf3ecfd9e7ee6e574501c8399d5d0fc686824469765
                                                        • Instruction ID: 84e37fcd07c17cd3c7d4ff0b63271c3f35892a812e85c7f8a3c50b6f584e8992
                                                        • Opcode Fuzzy Hash: e3b057c2b9a2fb5080336cf3ecfd9e7ee6e574501c8399d5d0fc686824469765
                                                        • Instruction Fuzzy Hash: 5641B171A04318ABDF11EF54E845BFE7BF9EF88720F00006AF945A3291DBB09A45DB61
                                                        APIs
                                                        • socket.WSOCK32(00000002,00000002,00000011), ref: 00F469D1
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F469E1
                                                          • Part of subcall function 00ED9837: __itow.LIBCMT ref: 00ED9862
                                                          • Part of subcall function 00ED9837: __swprintf.LIBCMT ref: 00ED98AC
                                                        • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00F46A45
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F46A51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$__itow__swprintfsocket
                                                        • String ID:
                                                        • API String ID: 2214342067-0
                                                        • Opcode ID: c4644bd7c5a67fb48824db047fdebf8171aeb31aa9cdf902fe4feec9feaa31da
                                                        • Instruction ID: 113666529a76a4c3e1ea51b5084fc30ebc37c6d757963ec61ecb1eeaaa59a2d8
                                                        • Opcode Fuzzy Hash: c4644bd7c5a67fb48824db047fdebf8171aeb31aa9cdf902fe4feec9feaa31da
                                                        • Instruction Fuzzy Hash: FE41BF35700200AFEB64AF28DC86F2A77E8DB05B14F048059FA59EB3C3DA749D019792
                                                        APIs
                                                        • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00F5F910), ref: 00F464A7
                                                        • _strlen.LIBCMT ref: 00F464D9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _strlen
                                                        • String ID:
                                                        • API String ID: 4218353326-0
                                                        • Opcode ID: 1cf264c6d32968b9acf13ee5178d65b9653350c514f0768c3e40062104ad63cb
                                                        • Instruction ID: 115952ae3fa3f7f08da43397c0fdb9859804d102a43e143961bbc50f368548e7
                                                        • Opcode Fuzzy Hash: 1cf264c6d32968b9acf13ee5178d65b9653350c514f0768c3e40062104ad63cb
                                                        • Instruction Fuzzy Hash: 57419175900208ABCB14EBA8EC96FBEBBE8EF05320F148156FD15A7296DB30AD05D751
                                                        APIs
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00F3B89E
                                                        • GetLastError.KERNEL32(?,00000000), ref: 00F3B8C4
                                                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00F3B8E9
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00F3B915
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                        • String ID:
                                                        • API String ID: 3321077145-0
                                                        • Opcode ID: 0dfddd26ba2080d9382dd1fb977d34ae5413f6ebd7b1870d5c50b58b5d16cb39
                                                        • Instruction ID: bb9c1804dfe70b59a98c45551a07b23872c47dab6ea93cf984aad01b6f56fbce
                                                        • Opcode Fuzzy Hash: 0dfddd26ba2080d9382dd1fb977d34ae5413f6ebd7b1870d5c50b58b5d16cb39
                                                        • Instruction Fuzzy Hash: FC412D39A00654DFCB14EF15C855A5DBBE1EF49720F058099ED4AAB362CB34FD02EB91
                                                        APIs
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F588DE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: InvalidateRect
                                                        • String ID:
                                                        • API String ID: 634782764-0
                                                        • Opcode ID: df2f4602445ef405dbf79786d414d4a9a4be5db1c385479ab130a9d95014323f
                                                        • Instruction ID: 7e46a8f8ace38ea940f9a074257ee4d317f190977268d1d4eae7540321eccc80
                                                        • Opcode Fuzzy Hash: df2f4602445ef405dbf79786d414d4a9a4be5db1c385479ab130a9d95014323f
                                                        • Instruction Fuzzy Hash: AE31C334A40108EEEB219B58CC45BB97BA5EB057A3F944112FF11F62A1CE31D94ABB53
                                                        APIs
                                                        • ClientToScreen.USER32(?,?), ref: 00F5AB60
                                                        • GetWindowRect.USER32(?,?), ref: 00F5ABD6
                                                        • PtInRect.USER32(?,?,00F5C014), ref: 00F5ABE6
                                                        • MessageBeep.USER32(00000000), ref: 00F5AC57
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                        • String ID:
                                                        • API String ID: 1352109105-0
                                                        • Opcode ID: 1daca0275b788bcf32442ffa1af9ff75f24a217ba4e04f737faead1fcf941797
                                                        • Instruction ID: b1dcdfc60822197e9bab03916520796e5f4430ffd0a94982afb75810385e44a1
                                                        • Opcode Fuzzy Hash: 1daca0275b788bcf32442ffa1af9ff75f24a217ba4e04f737faead1fcf941797
                                                        • Instruction Fuzzy Hash: ED41B330A00208DFCB12DF58C888B597BF5FF49712F1882A5EE559B364D730E859EB92
                                                        APIs
                                                        • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00F30B27
                                                        • SetKeyboardState.USER32(00000080,?,00000001), ref: 00F30B43
                                                        • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00F30BA9
                                                        • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00F30BFB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: 1751e7025c63809268fab338b6c3aeed4e2d4673d994de639b64a0aa84680376
                                                        • Instruction ID: 8ecb7cf50f52f0e6d483cc7ec8839d88cbfe25dd6fcd0478c39fa4a2ff026952
                                                        • Opcode Fuzzy Hash: 1751e7025c63809268fab338b6c3aeed4e2d4673d994de639b64a0aa84680376
                                                        • Instruction Fuzzy Hash: BA314B70D40318AEFB308B298C15BFAFBA9AB85335F08436BF581D21D1CB748944B755
                                                        APIs
                                                        • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00F30C66
                                                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 00F30C82
                                                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 00F30CE1
                                                        • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00F30D33
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: 440cbbb193ac4aede1b694122ea938306ace59fc1c81ad6c07669cd5a548e03e
                                                        • Instruction ID: 95e967f030b0582a5a357e2fbafd5752e1214ce7adae60fb4fd8d07d64627e92
                                                        • Opcode Fuzzy Hash: 440cbbb193ac4aede1b694122ea938306ace59fc1c81ad6c07669cd5a548e03e
                                                        • Instruction Fuzzy Hash: 3F313730E403186EFF308A648C247FEBBA5AB45331F08536BE481621D1DB799945F7A1
                                                        APIs
                                                        • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00F061FB
                                                        • __isleadbyte_l.LIBCMT ref: 00F06229
                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00F06257
                                                        • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00F0628D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                        • String ID:
                                                        • API String ID: 3058430110-0
                                                        • Opcode ID: 424552d61c6ec4e294cd9a5fb72ecc7c32918dfe7eabc2864c1f4338e4bfb37a
                                                        • Instruction ID: 30766830516139f655a154318dca1dbc657b359ac4b8fd175960d4cb57036f2d
                                                        • Opcode Fuzzy Hash: 424552d61c6ec4e294cd9a5fb72ecc7c32918dfe7eabc2864c1f4338e4bfb37a
                                                        • Instruction Fuzzy Hash: 8031AE31A0424AAFDF218F65CC44BBA7BA9BF41720F154029F864D71E1D731D960FB90
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 00F54F02
                                                          • Part of subcall function 00F33641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F3365B
                                                          • Part of subcall function 00F33641: GetCurrentThreadId.KERNEL32 ref: 00F33662
                                                          • Part of subcall function 00F33641: AttachThreadInput.USER32(00000000,?,00F35005), ref: 00F33669
                                                        • GetCaretPos.USER32(?), ref: 00F54F13
                                                        • ClientToScreen.USER32(00000000,?), ref: 00F54F4E
                                                        • GetForegroundWindow.USER32 ref: 00F54F54
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                        • String ID:
                                                        • API String ID: 2759813231-0
                                                        • Opcode ID: 083215c2560347936aa670782d0df936708c10fb42eb60e3c94fd9fc6088f22c
                                                        • Instruction ID: a6b091762e29133e1cdffc7d7ced1c86a9d0dde80410173ecbe3eb87ad04f0ab
                                                        • Opcode Fuzzy Hash: 083215c2560347936aa670782d0df936708c10fb42eb60e3c94fd9fc6088f22c
                                                        • Instruction Fuzzy Hash: 0A312D71D00208AFCB00EFA5CC859EFB7F9EF88304F10406AE915E7241EA75AE459BA0
                                                        APIs
                                                          • Part of subcall function 00ED2612: GetWindowLongW.USER32(?,000000EB), ref: 00ED2623
                                                        • GetCursorPos.USER32(?), ref: 00F5C4D2
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00F0B9AB,?,?,?,?,?), ref: 00F5C4E7
                                                        • GetCursorPos.USER32(?), ref: 00F5C534
                                                        • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00F0B9AB,?,?,?), ref: 00F5C56E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                        • String ID:
                                                        • API String ID: 2864067406-0
                                                        • Opcode ID: 4773939931d5e88d84cca0cb36afcb126af769abd1358d55f2abe983e646fae4
                                                        • Instruction ID: 6a55275024a669766bf422d477179a3cb7638776713b5552532fea0fcd559e34
                                                        • Opcode Fuzzy Hash: 4773939931d5e88d84cca0cb36afcb126af769abd1358d55f2abe983e646fae4
                                                        • Instruction Fuzzy Hash: E831A535500118AFCF16CF98C858EEA7BF5EB09721F484069FE068B261D731AD58EBE4
                                                        APIs
                                                          • Part of subcall function 00F2810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F28121
                                                          • Part of subcall function 00F2810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F2812B
                                                          • Part of subcall function 00F2810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F2813A
                                                          • Part of subcall function 00F2810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F28141
                                                          • Part of subcall function 00F2810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F28157
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00F286A3
                                                        • _memcmp.LIBCMT ref: 00F286C6
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F286FC
                                                        • HeapFree.KERNEL32(00000000), ref: 00F28703
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                        • String ID:
                                                        • API String ID: 1592001646-0
                                                        • Opcode ID: d813bd575847d6847609449f20fcfd422544ba9d54e6c3db394700b5d86355cf
                                                        • Instruction ID: 74c3b8e0aa7edcaa104b6f38d2d66afeefdc841668abbc936cbbaa3fa3daf34a
                                                        • Opcode Fuzzy Hash: d813bd575847d6847609449f20fcfd422544ba9d54e6c3db394700b5d86355cf
                                                        • Instruction Fuzzy Hash: 7E21C131E0221CEFDB10DFA4D948BEEBBB8EF50355F144099E405A7241DB30AE06EB50
                                                        APIs
                                                        • __setmode.LIBCMT ref: 00EF09AE
                                                          • Part of subcall function 00ED5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00F37896,?,?,00000000), ref: 00ED5A2C
                                                          • Part of subcall function 00ED5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00F37896,?,?,00000000,?,?), ref: 00ED5A50
                                                        • _fprintf.LIBCMT ref: 00EF09E5
                                                        • OutputDebugStringW.KERNEL32(?), ref: 00F25DBB
                                                          • Part of subcall function 00EF4AAA: _flsall.LIBCMT ref: 00EF4AC3
                                                        • __setmode.LIBCMT ref: 00EF0A1A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                                                        • String ID:
                                                        • API String ID: 521402451-0
                                                        • Opcode ID: 783c4d826c75a1beeb0c3cd9fc7902b4e8067e8e08f4c7823b9797343b301b3f
                                                        • Instruction ID: 4e0377e5c8c605270714fa6d1df78b26c0dd6edb2bcf5ac0d7d5c5b3a6c172bf
                                                        • Opcode Fuzzy Hash: 783c4d826c75a1beeb0c3cd9fc7902b4e8067e8e08f4c7823b9797343b301b3f
                                                        • Instruction Fuzzy Hash: F91102B290460C6BDB08B3B4AC469BEB7E9DF81360F241056F304B72C3EE304846A7A5
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F417A3
                                                          • Part of subcall function 00F4182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F4184C
                                                          • Part of subcall function 00F4182D: InternetCloseHandle.WININET(00000000), ref: 00F418E9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Internet$CloseConnectHandleOpen
                                                        • String ID:
                                                        • API String ID: 1463438336-0
                                                        • Opcode ID: b0a4e5b6257c9884dae7f9884ddde35a50aad6ce46d488515d34c0b58b0645cc
                                                        • Instruction ID: 7494d18bdd257d7f90b038cc42e5cc7d3f985bce1d07193f92b65d98b8520b63
                                                        • Opcode Fuzzy Hash: b0a4e5b6257c9884dae7f9884ddde35a50aad6ce46d488515d34c0b58b0645cc
                                                        • Instruction Fuzzy Hash: 9921AE36600705BFEB129F60DC01FBABFA9FF48711F10402AFE5196651DB759851BBA0
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(?,00F5FAC0), ref: 00F33A64
                                                        • GetLastError.KERNEL32 ref: 00F33A73
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F33A82
                                                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00F5FAC0), ref: 00F33ADF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$AttributesErrorFileLast
                                                        • String ID:
                                                        • API String ID: 2267087916-0
                                                        • Opcode ID: 0c907a2012121d652007119c86ccd89a460e801aceb68300cf0d11cf680d0a4b
                                                        • Instruction ID: eda9f7841fb3f17d450b62311325cdcd0e59730d0f7e6e0e62f054407f24beb4
                                                        • Opcode Fuzzy Hash: 0c907a2012121d652007119c86ccd89a460e801aceb68300cf0d11cf680d0a4b
                                                        • Instruction Fuzzy Hash: 9921B1755083058F8700EF28C88186ABBE8EF55374F104A6AF4D9C72A1E735DA0AEB42
                                                        APIs
                                                          • Part of subcall function 00F2F0BC: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00F2DCD3,?,?,?,00F2EAC6,00000000,000000EF,00000119,?,?), ref: 00F2F0CB
                                                          • Part of subcall function 00F2F0BC: lstrcpyW.KERNEL32(00000000,?,?,00F2DCD3,?,?,?,00F2EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00F2F0F1
                                                          • Part of subcall function 00F2F0BC: lstrcmpiW.KERNEL32(00000000,?,00F2DCD3,?,?,?,00F2EAC6,00000000,000000EF,00000119,?,?), ref: 00F2F122
                                                        • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00F2EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00F2DCEC
                                                        • lstrcpyW.KERNEL32(00000000,?,?,00F2EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00F2DD12
                                                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00F2EAC6,00000000,000000EF,00000119,?,?,00000000), ref: 00F2DD46
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: lstrcmpilstrcpylstrlen
                                                        • String ID: cdecl
                                                        • API String ID: 4031866154-3896280584
                                                        • Opcode ID: 573bb4f11a2ca91f80e887eae4f792f732e6a48a5c93d0642e8ec99b4df3fd4c
                                                        • Instruction ID: 1cc1b8b764eae9771428ca2d71ccf6a000411098f72ad27ef6edea01968c6393
                                                        • Opcode Fuzzy Hash: 573bb4f11a2ca91f80e887eae4f792f732e6a48a5c93d0642e8ec99b4df3fd4c
                                                        • Instruction Fuzzy Hash: A811D33A600319EBDB25AF34EC45D7A77A8FF45310B80506AF906CB2A1EB71D841E7D1
                                                        APIs
                                                        • _free.LIBCMT ref: 00F05101
                                                          • Part of subcall function 00EF571C: __FF_MSGBANNER.LIBCMT ref: 00EF5733
                                                          • Part of subcall function 00EF571C: __NMSG_WRITE.LIBCMT ref: 00EF573A
                                                          • Part of subcall function 00EF571C: RtlAllocateHeap.NTDLL(01780000,00000000,00000001,00000000,?,?,?,00EF0DD3,?), ref: 00EF575F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap_free
                                                        • String ID:
                                                        • API String ID: 614378929-0
                                                        • Opcode ID: be8a98eb068c212475a0b95209762926b1d10097a807821da4445f3ff9fca891
                                                        • Instruction ID: 9852fb06b7bd36bbdb6dc09562e783204d71ca9b2c205a30d1d3afeb37861324
                                                        • Opcode Fuzzy Hash: be8a98eb068c212475a0b95209762926b1d10097a807821da4445f3ff9fca891
                                                        • Instruction Fuzzy Hash: 19110672A04A1DAECF312F70AC0577F37D89F10771B10192AFB04AA1E0DEB08840BB90
                                                        APIs
                                                        • _memset.LIBCMT ref: 00ED44CF
                                                          • Part of subcall function 00ED407C: _memset.LIBCMT ref: 00ED40FC
                                                          • Part of subcall function 00ED407C: _wcscpy.LIBCMT ref: 00ED4150
                                                          • Part of subcall function 00ED407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00ED4160
                                                        • KillTimer.USER32(?,00000001,?,?), ref: 00ED4524
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00ED4533
                                                        • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F0D4B9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                        • String ID:
                                                        • API String ID: 1378193009-0
                                                        • Opcode ID: 2f4b4cf02cc61711486b0ac9cde6a28d981fc50fb7553cca0d3c6f0f705b2bc6
                                                        • Instruction ID: 7eae647987063b0f1865651e8c0d6535e2d2c53e130c428598543b258ac7053f
                                                        • Opcode Fuzzy Hash: 2f4b4cf02cc61711486b0ac9cde6a28d981fc50fb7553cca0d3c6f0f705b2bc6
                                                        • Instruction Fuzzy Hash: BA21F5B4904788AFE732CB649855BE6BBECDB15318F04109EE78E662C1C3742A85EB41
                                                        APIs
                                                          • Part of subcall function 00ED5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00F37896,?,?,00000000), ref: 00ED5A2C
                                                          • Part of subcall function 00ED5A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00F37896,?,?,00000000,?,?), ref: 00ED5A50
                                                        • gethostbyname.WSOCK32(?), ref: 00F46399
                                                        • WSAGetLastError.WSOCK32(00000000), ref: 00F463A4
                                                        • _memmove.LIBCMT ref: 00F463D1
                                                        • inet_ntoa.WSOCK32(?), ref: 00F463DC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                                                        • String ID:
                                                        • API String ID: 1504782959-0
                                                        • Opcode ID: e1e09dc45278b314a3af13dbbced803fb973401e658f00156688ba24196d7776
                                                        • Instruction ID: 1540d25b291dc7f27ca3bd9ba37f7ebbe848e8c92f707df7c67ee9cdad81b7c8
                                                        • Opcode Fuzzy Hash: e1e09dc45278b314a3af13dbbced803fb973401e658f00156688ba24196d7776
                                                        • Instruction Fuzzy Hash: E1115136900109AFCB04FBA4DD46CAE7BB8EF04321B144066F905B7262DB309E09EB61
                                                        APIs
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00F28B61
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F28B73
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F28B89
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F28BA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: 67f34aad597aca3a57e942cba9dba414fa2b1e3a3620d3f54a51f480af08cbfc
                                                        • Instruction ID: 693ce09fde8b96042534e476b005317d893f5fc4e2d1d4670ff627f6af94e7b4
                                                        • Opcode Fuzzy Hash: 67f34aad597aca3a57e942cba9dba414fa2b1e3a3620d3f54a51f480af08cbfc
                                                        • Instruction Fuzzy Hash: 30111C79901218FFDB11DF95CC85F9DBBB4FB48750F204095EA00B7250DA716E11EB94
                                                        APIs
                                                          • Part of subcall function 00ED2612: GetWindowLongW.USER32(?,000000EB), ref: 00ED2623
                                                        • DefDlgProcW.USER32(?,00000020,?), ref: 00ED12D8
                                                        • GetClientRect.USER32(?,?), ref: 00F0B5FB
                                                        • GetCursorPos.USER32(?), ref: 00F0B605
                                                        • ScreenToClient.USER32(?,?), ref: 00F0B610
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Client$CursorLongProcRectScreenWindow
                                                        • String ID:
                                                        • API String ID: 4127811313-0
                                                        • Opcode ID: 21ebdaab798bb2fa40d07f74adad49b6c7d29e1205cc271a46255757307c3a24
                                                        • Instruction ID: 11b9a63324127a8c4f51b3547d72df6f4ef94b6285b519a437a87c4c60a4b3a7
                                                        • Opcode Fuzzy Hash: 21ebdaab798bb2fa40d07f74adad49b6c7d29e1205cc271a46255757307c3a24
                                                        • Instruction Fuzzy Hash: A8112835A0011DBBCB10EF98D8859EE77B9EB05301F500496FA01E7251D731AA56ABA5
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00F2FCED,?,00F30D40,?,00008000), ref: 00F3115F
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00F2FCED,?,00F30D40,?,00008000), ref: 00F31184
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00F2FCED,?,00F30D40,?,00008000), ref: 00F3118E
                                                        • Sleep.KERNEL32(?,?,?,?,?,?,?,00F2FCED,?,00F30D40,?,00008000), ref: 00F311C1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CounterPerformanceQuerySleep
                                                        • String ID:
                                                        • API String ID: 2875609808-0
                                                        • Opcode ID: c1a5568083fa8c4e7a5f43dd93a7de6481ee509185ec0333dad38f5c041c4602
                                                        • Instruction ID: ac6363a183297a54c2d50447a6a17729b938eeba842631785a0c1cbe515a5006
                                                        • Opcode Fuzzy Hash: c1a5568083fa8c4e7a5f43dd93a7de6481ee509185ec0333dad38f5c041c4602
                                                        • Instruction Fuzzy Hash: 50113C32D01A1DD7CF00AFA5D848AEEBBBCFF09721F504095EA41B2241CB709554EBA5
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00F2D84D
                                                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00F2D864
                                                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00F2D879
                                                        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00F2D897
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Type$Register$FileLoadModuleNameUser
                                                        • String ID:
                                                        • API String ID: 1352324309-0
                                                        • Opcode ID: 2d81fa611a61c2afa1871c5eccca436eff7e43232aa85b7bfbc0f9070b3d7e7e
                                                        • Instruction ID: d03e455b9e99104eb341331751dcd441074c80a2e3a925dfc8c3efb6c834cb7c
                                                        • Opcode Fuzzy Hash: 2d81fa611a61c2afa1871c5eccca436eff7e43232aa85b7bfbc0f9070b3d7e7e
                                                        • Instruction Fuzzy Hash: 11116175606324DBE320CF50EC08FD3BBBCEB00B00F108569A656D6090D7B0E549EBA1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                        • String ID:
                                                        • API String ID: 3016257755-0
                                                        • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                        • Instruction ID: 7a120ceccc5c8052d168e921847f7c84f5ada1ad5274fe17ea7dcf3c12f3ef68
                                                        • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                                                        • Instruction Fuzzy Hash: 10014E7284424EBBCF166E84CC01CED3F66BB18355F588595FA18580B1D336E9B1BB81
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00F5B2E4
                                                        • ScreenToClient.USER32(?,?), ref: 00F5B2FC
                                                        • ScreenToClient.USER32(?,?), ref: 00F5B320
                                                        • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00F5B33B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ClientRectScreen$InvalidateWindow
                                                        • String ID:
                                                        • API String ID: 357397906-0
                                                        • Opcode ID: 63dbb051b7f6f6b2a9de15785ba7b17bf59597a16261af1aafaa3362a5a0a245
                                                        • Instruction ID: aea1afd0b41015d8d1fcc961126533186c04fa39b9a3a25f904d3d20f7494bfe
                                                        • Opcode Fuzzy Hash: 63dbb051b7f6f6b2a9de15785ba7b17bf59597a16261af1aafaa3362a5a0a245
                                                        • Instruction Fuzzy Hash: 681143B9D0060DEFDB41CFA9C8849EEBBB9FB08311F1081A6E914E3620D735AA559F50
                                                        APIs
                                                        • _memset.LIBCMT ref: 00F5B644
                                                        • _memset.LIBCMT ref: 00F5B653
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00F96F20,00F96F64), ref: 00F5B682
                                                        • CloseHandle.KERNEL32 ref: 00F5B694
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _memset$CloseCreateHandleProcess
                                                        • String ID:
                                                        • API String ID: 3277943733-0
                                                        • Opcode ID: ecb907454d00bf9e10b7c69207f35826a4fa94c83da855eaf3ef9f871ff0e5b2
                                                        • Instruction ID: 59509cb3a7bb2025ff3fd255ae20bd007c4f31748dfb189aa41493973bf52d7e
                                                        • Opcode Fuzzy Hash: ecb907454d00bf9e10b7c69207f35826a4fa94c83da855eaf3ef9f871ff0e5b2
                                                        • Instruction Fuzzy Hash: D9F012B294030C7BF7102765BC06FBB7A9CEB09799F004065FB08E51A2E7765C10A7A8
                                                        APIs
                                                        • EnterCriticalSection.KERNEL32(?), ref: 00F36BE6
                                                          • Part of subcall function 00F376C4: _memset.LIBCMT ref: 00F376F9
                                                        • _memmove.LIBCMT ref: 00F36C09
                                                        • _memset.LIBCMT ref: 00F36C16
                                                        • LeaveCriticalSection.KERNEL32(?), ref: 00F36C26
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection_memset$EnterLeave_memmove
                                                        • String ID:
                                                        • API String ID: 48991266-0
                                                        • Opcode ID: 2d118a844192aa766d189fed574b4872b2a23fc25a8dcbdc098b322317f72509
                                                        • Instruction ID: 2936b209e10d7c2b046aa52d4c55372cdd819d477c291882f3864c6036123cfa
                                                        • Opcode Fuzzy Hash: 2d118a844192aa766d189fed574b4872b2a23fc25a8dcbdc098b322317f72509
                                                        • Instruction Fuzzy Hash: FDF05E7A200204ABCF016F55DC85A8ABF6AEF45361F04C0A5FF096E227CB35E811DBB4
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 00ED2231
                                                        • SetTextColor.GDI32(?,000000FF), ref: 00ED223B
                                                        • SetBkMode.GDI32(?,00000001), ref: 00ED2250
                                                        • GetStockObject.GDI32(00000005), ref: 00ED2258
                                                        • GetWindowDC.USER32(?,00000000), ref: 00F0BE83
                                                        • GetPixel.GDI32(00000000,00000000,00000000), ref: 00F0BE90
                                                        • GetPixel.GDI32(00000000,?,00000000), ref: 00F0BEA9
                                                        • GetPixel.GDI32(00000000,00000000,?), ref: 00F0BEC2
                                                        • GetPixel.GDI32(00000000,?,?), ref: 00F0BEE2
                                                        • ReleaseDC.USER32(?,00000000), ref: 00F0BEED
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                        • String ID:
                                                        • API String ID: 1946975507-0
                                                        • Opcode ID: 26cd0e47627f4b17420251d0682d37d9bc8a88ea20a9089868cb60853692ec92
                                                        • Instruction ID: 308e8d658dc158c70e1a8aa67e5debec6aac0c74183f8b9ed35c172987a37194
                                                        • Opcode Fuzzy Hash: 26cd0e47627f4b17420251d0682d37d9bc8a88ea20a9089868cb60853692ec92
                                                        • Instruction Fuzzy Hash: 9CE03932504648AADB215FA4EC0DBD83B10EB15337F0483A6FB69980E187714985EB12
                                                        APIs
                                                        • GetCurrentThread.KERNEL32 ref: 00F2871B
                                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,00F282E6), ref: 00F28722
                                                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00F282E6), ref: 00F2872F
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,00F282E6), ref: 00F28736
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CurrentOpenProcessThreadToken
                                                        • String ID:
                                                        • API String ID: 3974789173-0
                                                        • Opcode ID: 03851334d0fdcfaaf6ebeea01b742ab1c0c44a8225d8361eeb382a6881472675
                                                        • Instruction ID: 639555a36e87f7d330a0f18960ce862789fb5329964efce95567230bfaaa98ef
                                                        • Opcode Fuzzy Hash: 03851334d0fdcfaaf6ebeea01b742ab1c0c44a8225d8361eeb382a6881472675
                                                        • Instruction Fuzzy Hash: E5E08676A123259BD7605FB06D0CB573BBCEF607E3F144868B345CA0C0DA34844AE750
                                                        APIs
                                                        • OleSetContainedObject.OLE32(?,00000001), ref: 00F2B4BE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ContainedObject
                                                        • String ID: AutoIt3GUI$Container
                                                        • API String ID: 3565006973-3941886329
                                                        • Opcode ID: 6976e0c1b4c758f399764504a1ca7eb63376a5c2aa3a257542271271f73cd5f6
                                                        • Instruction ID: 3729d1491d6276d10304f7ba77581d75c0f9889071e54ba65fd9ca4aea2687f8
                                                        • Opcode Fuzzy Hash: 6976e0c1b4c758f399764504a1ca7eb63376a5c2aa3a257542271271f73cd5f6
                                                        • Instruction Fuzzy Hash: 0D916771600611AFDB14DF64D885B6ABBE9FF48710F24856DED0ACF2A2DB70E841DB50
                                                        APIs
                                                          • Part of subcall function 00EEFC86: _wcscpy.LIBCMT ref: 00EEFCA9
                                                          • Part of subcall function 00ED9837: __itow.LIBCMT ref: 00ED9862
                                                          • Part of subcall function 00ED9837: __swprintf.LIBCMT ref: 00ED98AC
                                                        • __wcsnicmp.LIBCMT ref: 00F3B02D
                                                        • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00F3B0F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                        • String ID: LPT
                                                        • API String ID: 3222508074-1350329615
                                                        • Opcode ID: 88857f8bcada2195c8ba264932695ff3cfcb324042bbf18697cd87a41129e5b7
                                                        • Instruction ID: e12993cd890b8f578abb79a956b041e2bad07b8e4af3909ad82c2bf0436ea8cc
                                                        • Opcode Fuzzy Hash: 88857f8bcada2195c8ba264932695ff3cfcb324042bbf18697cd87a41129e5b7
                                                        • Instruction Fuzzy Hash: 84617576E00219AFCB18EF94C861EAEB7F4EF08720F15405AFA16AB351D770AE45DB50
                                                        APIs
                                                        • Sleep.KERNEL32(00000000), ref: 00EE2968
                                                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 00EE2981
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemorySleepStatus
                                                        • String ID: @
                                                        • API String ID: 2783356886-2766056989
                                                        • Opcode ID: cca05cee1cc02c096858460729e95ee3a7ae6e44f544e60ec642de37de34ca9b
                                                        • Instruction ID: 69df759636cb73ab499763e505d5a49703ffa5e2eb82217886d48ec4e07506d2
                                                        • Opcode Fuzzy Hash: cca05cee1cc02c096858460729e95ee3a7ae6e44f544e60ec642de37de34ca9b
                                                        • Instruction Fuzzy Hash: 3C5136714087489BD320AF10DC86BAFBBF8FB85344F41885EF2D8511A2DB319569DB67
                                                        APIs
                                                          • Part of subcall function 00ED4F0B: __fread_nolock.LIBCMT ref: 00ED4F29
                                                        • _wcscmp.LIBCMT ref: 00F39824
                                                        • _wcscmp.LIBCMT ref: 00F39837
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: _wcscmp$__fread_nolock
                                                        • String ID: FILE
                                                        • API String ID: 4029003684-3121273764
                                                        • Opcode ID: a6c385a4dd274e8a840e3be214b7afa49aceffb6e8ecb8e0eba35bd0ee5d5e60
                                                        • Instruction ID: 978b6937917405befc573f091a469fba8e53db46b550f8dd79806d6a39bdfd2d
                                                        • Opcode Fuzzy Hash: a6c385a4dd274e8a840e3be214b7afa49aceffb6e8ecb8e0eba35bd0ee5d5e60
                                                        • Instruction Fuzzy Hash: BB41B671A04209BBDF21ABA0CC45FEFBBFDDF85720F40046AF904B7291DAB199059B61
                                                        APIs
                                                        • _memset.LIBCMT ref: 00F4259E
                                                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00F425D4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CrackInternet_memset
                                                        • String ID: |
                                                        • API String ID: 1413715105-2343686810
                                                        • Opcode ID: e006fbade9e72724fa0d4b2c7a3fe008e6b3b9c8c6c8a46ec9ac2db2bc1e4ef3
                                                        • Instruction ID: e0d88f2ce3295bc0d101b4d9ec2e3af6976ea743634f99c65a6677ba0edd9bb1
                                                        • Opcode Fuzzy Hash: e006fbade9e72724fa0d4b2c7a3fe008e6b3b9c8c6c8a46ec9ac2db2bc1e4ef3
                                                        • Instruction Fuzzy Hash: 95310371801219AFCF01AFA4CC85EEEBFB8FF08350F10106AFD14B6262EA315956DB60
                                                        APIs
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00F57B61
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F57B76
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: '
                                                        • API String ID: 3850602802-1997036262
                                                        • Opcode ID: 46a0b6e2bc1fa9f65a44b67de2e3313294e73154cf8fe71773d68b71bd47199d
                                                        • Instruction ID: af3c045c93ae468acefb5b85dd6b909ddb3981ca73f505e12c9d38986b060114
                                                        • Opcode Fuzzy Hash: 46a0b6e2bc1fa9f65a44b67de2e3313294e73154cf8fe71773d68b71bd47199d
                                                        • Instruction Fuzzy Hash: 1A412875A04309AFDB14DF65D880BDABBB5FB08301F10016AEE04EB395D730AA45DF90
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?,?), ref: 00F56B17
                                                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00F56B53
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$DestroyMove
                                                        • String ID: static
                                                        • API String ID: 2139405536-2160076837
                                                        • Opcode ID: b581811afdcc060ba9ed04a164f4db930dde30eadc2877d6acdcd884effbb9b5
                                                        • Instruction ID: 8d74c29df0208956c7c14c5568b71b8dbfe79210150bc41b92434889a725f3d9
                                                        • Opcode Fuzzy Hash: b581811afdcc060ba9ed04a164f4db930dde30eadc2877d6acdcd884effbb9b5
                                                        • Instruction Fuzzy Hash: 1E31B071200608AEDB109F64CC40BFB77A9FF88721F509519FEA5D3190DA34AC86EB60
                                                        APIs
                                                        • _memset.LIBCMT ref: 00F32911
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00F3294C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: InfoItemMenu_memset
                                                        • String ID: 0
                                                        • API String ID: 2223754486-4108050209
                                                        • Opcode ID: 5392a67f6a52c409274e3771c703c9bf3692106c01a29d539a1ca754d2bdf92c
                                                        • Instruction ID: 9e454f77918f958375ef3acefaa4a73934a08aa4eb11ee277ca21e0805ac6537
                                                        • Opcode Fuzzy Hash: 5392a67f6a52c409274e3771c703c9bf3692106c01a29d539a1ca754d2bdf92c
                                                        • Instruction Fuzzy Hash: 6A31C131A01309DFEB65CF58CC85BAEBBF8EF45370F140029E985A61A1D7709944FB51
                                                        APIs
                                                        • __snwprintf.LIBCMT ref: 00F43A66
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: __snwprintf_memmove
                                                        • String ID: , $$AUTOITCALLVARIABLE%d
                                                        • API String ID: 3506404897-2584243854
                                                        • Opcode ID: 55e225298be1e46bed726cffa7111a8dcb9c3d7851d359398cf501c44e1b95f7
                                                        • Instruction ID: addeb3b91b823bbefa07ad07d8c0209823f7ab873800ce778a706cb58bc273cc
                                                        • Opcode Fuzzy Hash: 55e225298be1e46bed726cffa7111a8dcb9c3d7851d359398cf501c44e1b95f7
                                                        • Instruction Fuzzy Hash: AE218135640219AFCF10EF64CC82AAE7BF5EF44700F500455E955BB282DB34EA46DB61
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00F56761
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F5676C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Combobox
                                                        • API String ID: 3850602802-2096851135
                                                        • Opcode ID: 45388623ffb877c9e8000e4ae8c1b8e352716a2cd48a31120fd387b6aae403d1
                                                        • Instruction ID: bd057b7ea061ea286af0167be6f6ea53be829d96a37423ca608a0831a3dba085
                                                        • Opcode Fuzzy Hash: 45388623ffb877c9e8000e4ae8c1b8e352716a2cd48a31120fd387b6aae403d1
                                                        • Instruction Fuzzy Hash: 3A11B6716002086FEF159F54DC80EBB3B6AEB48369F510125FE24D7290DA75DC55A7A0
                                                        APIs
                                                          • Part of subcall function 00ED1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00ED1D73
                                                          • Part of subcall function 00ED1D35: GetStockObject.GDI32(00000011), ref: 00ED1D87
                                                          • Part of subcall function 00ED1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00ED1D91
                                                        • GetWindowRect.USER32(00000000,?), ref: 00F56C71
                                                        • GetSysColor.USER32(00000012), ref: 00F56C8B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                        • String ID: static
                                                        • API String ID: 1983116058-2160076837
                                                        • Opcode ID: 88f46029cf078fa71ba45bcd9dcb0a770a63bdb80370c6061ddfe130de846841
                                                        • Instruction ID: 9d9a0cc82450e6c54bd9add87b151defd964c51c66b0ade0548973f420e4bffe
                                                        • Opcode Fuzzy Hash: 88f46029cf078fa71ba45bcd9dcb0a770a63bdb80370c6061ddfe130de846841
                                                        • Instruction Fuzzy Hash: 74215972910209AFDF04DFA8CC45AEA7BA9FB08316F004629FE95D3250E735E854EB60
                                                        APIs
                                                        • GetWindowTextLengthW.USER32(00000000), ref: 00F569A2
                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00F569B1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: LengthMessageSendTextWindow
                                                        • String ID: edit
                                                        • API String ID: 2978978980-2167791130
                                                        • Opcode ID: 25162469fb2297c9fe5e63a7194c49def76d5836086a3a03a5be6f243f42ce0f
                                                        • Instruction ID: 675519ead533e26a12a600fb51bb3c76172ac77ba0ca93d4ecee6ac4dc7a4c44
                                                        • Opcode Fuzzy Hash: 25162469fb2297c9fe5e63a7194c49def76d5836086a3a03a5be6f243f42ce0f
                                                        • Instruction Fuzzy Hash: 66115871900208ABEB108E649C40AAB37A9EB053B6F904624FEB5D71E0C635DC59A760
                                                        APIs
                                                        • _memset.LIBCMT ref: 00F32A22
                                                        • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00F32A41
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: InfoItemMenu_memset
                                                        • String ID: 0
                                                        • API String ID: 2223754486-4108050209
                                                        • Opcode ID: 4102c9278e9bada67754726dfd772ee4d29f64af93c61d25b2af42eab7a57be2
                                                        • Instruction ID: 5149573e93476f3d05c4c01570b98e4a09599ca25ee7a2697977474d7fe3132e
                                                        • Opcode Fuzzy Hash: 4102c9278e9bada67754726dfd772ee4d29f64af93c61d25b2af42eab7a57be2
                                                        • Instruction Fuzzy Hash: 90110832D01118ABDF71DF58DC44BAA73B8AB46330F244021E995E72A0D734AD0AF791
                                                        APIs
                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00F4222C
                                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00F42255
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Internet$OpenOption
                                                        • String ID: <local>
                                                        • API String ID: 942729171-4266983199
                                                        • Opcode ID: 51e8b740bffa7d2e651a0811a3a909e2a212061c7407db45227e472e52e6fd6c
                                                        • Instruction ID: c30176fd5841cfbfe905cdaff67fab97d76906d916da2d01dff0c01e2564c367
                                                        • Opcode Fuzzy Hash: 51e8b740bffa7d2e651a0811a3a909e2a212061c7407db45227e472e52e6fd6c
                                                        • Instruction Fuzzy Hash: A711E370901225BAEB248F118C84FB7FFA8FF06361F50823AFE0586000D3B05A84E6F0
                                                        APIs
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                          • Part of subcall function 00F2AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F2AABC
                                                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00F28E73
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 372448540-1403004172
                                                        • Opcode ID: 6525c8b46cf4eb8bcd6b56cfa2a9c9fde79c1df8ee75d3caae74a68015130520
                                                        • Instruction ID: 96d7191a642a0a15ffcd74f0546302b34b4150547127bd48a1fed8c2c1d228a2
                                                        • Opcode Fuzzy Hash: 6525c8b46cf4eb8bcd6b56cfa2a9c9fde79c1df8ee75d3caae74a68015130520
                                                        • Instruction Fuzzy Hash: 2D01F572A02229AB8B14FBE4CC519FE73A9EF02360B10061AB871673E1EE355809E650
                                                        APIs
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                          • Part of subcall function 00F2AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F2AABC
                                                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00F28D6B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 372448540-1403004172
                                                        • Opcode ID: 7c448a7488b0097201b404d7f94c6e9dee3ee403cfed5e97339bbc3cc034e911
                                                        • Instruction ID: 5ff9c93a9717c1b05c4b36ccf50a08af81df09ede589cf5ca8cec821b0a78e4b
                                                        • Opcode Fuzzy Hash: 7c448a7488b0097201b404d7f94c6e9dee3ee403cfed5e97339bbc3cc034e911
                                                        • Instruction Fuzzy Hash: 8301D472A41219ABCB14EBA0DD52EFE73A8DF15390F60001AB841732D1DE249E0DE672
                                                        APIs
                                                          • Part of subcall function 00ED7DE1: _memmove.LIBCMT ref: 00ED7E22
                                                          • Part of subcall function 00F2AA99: GetClassNameW.USER32(?,?,000000FF), ref: 00F2AABC
                                                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00F28DEE
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_memmove
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 372448540-1403004172
                                                        • Opcode ID: 225740dd9f814877f9b625fea2bd2ad1d4c53f0147e551c018381bf420900fae
                                                        • Instruction ID: 6b8eee1a069889c22913eaad7ae193001e28491728c392251ee61958590a2508
                                                        • Opcode Fuzzy Hash: 225740dd9f814877f9b625fea2bd2ad1d4c53f0147e551c018381bf420900fae
                                                        • Instruction Fuzzy Hash: 0A01F772A41219A7CB10F7A4D952EFE73A8DF11350F600016B841B3292DE258E0EF671
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: ClassName_wcscmp
                                                        • String ID: #32770
                                                        • API String ID: 2292705959-463685578
                                                        • Opcode ID: 5a4b16c3be12fefbcbcba14b1bd8cae8b5dd32145ed5217580f38035a7202c49
                                                        • Instruction ID: 70bc777687418f2c341239d39157dafa31d90e865a4f117ccdbfd3b2655d00bb
                                                        • Opcode Fuzzy Hash: 5a4b16c3be12fefbcbcba14b1bd8cae8b5dd32145ed5217580f38035a7202c49
                                                        • Instruction Fuzzy Hash: CDE09232A0022C2AD720ABA9EC49AA7F7ACEB85B71F050067FD04D7051D960AA4587E1
                                                        APIs
                                                          • Part of subcall function 00F0B314: _memset.LIBCMT ref: 00F0B321
                                                          • Part of subcall function 00EF0940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00F0B2F0,?,?,?,00ED100A), ref: 00EF0945
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,00ED100A), ref: 00F0B2F4
                                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00ED100A), ref: 00F0B303
                                                        Strings
                                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00F0B2FE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                        • API String ID: 3158253471-631824599
                                                        • Opcode ID: dcae7cedb43d202504caca785b907179b55a4e853567f95ac284d47b74dbef84
                                                        • Instruction ID: 629d55f1038fccaf6ed8525e0201a6fd08bdbe8350d3356f57d2ebd442581610
                                                        • Opcode Fuzzy Hash: dcae7cedb43d202504caca785b907179b55a4e853567f95ac284d47b74dbef84
                                                        • Instruction Fuzzy Hash: 4DE06D706007048BD7609F28E8043467AE4AF40714F10CD6EE44AC7781E7B4D448EBA2
                                                        APIs
                                                        • GetSystemDirectoryW.KERNEL32(?), ref: 00F11775
                                                          • Part of subcall function 00F4BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,00F1195E,?), ref: 00F4BFFE
                                                          • Part of subcall function 00F4BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00F4C010
                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00F1196D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressDirectoryFreeLoadProcSystem
                                                        • String ID: WIN_XPe
                                                        • API String ID: 582185067-3257408948
                                                        • Opcode ID: 1fb9ba841b2ca204468c80559e01ac25a813c67c2ad029786d3bf0e566e4e44c
                                                        • Instruction ID: 42c0f24193d7f8a6573c3d9bf37e7c7d424e1a23c7f4b7b5716694c1d1cf34a1
                                                        • Opcode Fuzzy Hash: 1fb9ba841b2ca204468c80559e01ac25a813c67c2ad029786d3bf0e566e4e44c
                                                        • Instruction Fuzzy Hash: 55F0C97180010DDFDB15DBA5C988BECBBF8BB08315F640096E712A2291D7758F89EF61
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F559AE
                                                        • PostMessageW.USER32(00000000), ref: 00F559B5
                                                          • Part of subcall function 00F35244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F352BC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 8f0a663236dd4d69b4c3df3349b794208aa39b0e91c9133a996aeeab891d5e87
                                                        • Instruction ID: 06a4a3f1d1d6e8f141419657847f70352e8029c61e7f5c17619490a06e4c3332
                                                        • Opcode Fuzzy Hash: 8f0a663236dd4d69b4c3df3349b794208aa39b0e91c9133a996aeeab891d5e87
                                                        • Instruction Fuzzy Hash: DAD0C9313C0315BBE664BB709D0BFD77A14AB45B61F040865B346AB1D0D9E4A804D654
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F5596E
                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00F55981
                                                          • Part of subcall function 00F35244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00F352BC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1709570026.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                        • Associated: 00000000.00000002.1709491839.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F5F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709776950.0000000000F84000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709884477.0000000000F8E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1709985594.0000000000F97000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_ed0000_UF7jzc7ETP.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: c1880f236413c5978f2115d890c138ae0d4ee5483fa10e78a5f0cf85f0cdc58a
                                                        • Instruction ID: 5a5844555c67bbe26375142638e127494e12f72819497333d2fd873832d9a00a
                                                        • Opcode Fuzzy Hash: c1880f236413c5978f2115d890c138ae0d4ee5483fa10e78a5f0cf85f0cdc58a
                                                        • Instruction Fuzzy Hash: D4D0C935384315B7E664BB709D0BFD77A14AB40B61F040865B34AAB1D0D9E49804D654