Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LMxd0gpIxe.exe

Overview

General Information

Sample name:LMxd0gpIxe.exe
renamed because original name is a hash value
Original sample name:15c74162d5e448d5691900c39f7c8c9939204bcff280eb316fdd6802a3a28f3a.exe
Analysis ID:1588366
MD5:92fff178a6c268dd0af4bc3b420fb0f3
SHA1:5c4b1183dfbab7cf9f03eaa1db63603a63596d51
SHA256:15c74162d5e448d5691900c39f7c8c9939204bcff280eb316fdd6802a3a28f3a
Tags:AgentTeslaexeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • LMxd0gpIxe.exe (PID: 6600 cmdline: "C:\Users\user\Desktop\LMxd0gpIxe.exe" MD5: 92FFF178A6C268DD0AF4BC3B420FB0F3)
    • RegSvcs.exe (PID: 2872 cmdline: "C:\Users\user\Desktop\LMxd0gpIxe.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.stingatoareincendii.ro", "Username": "mojooooofileeeee@stingatoareincendii.ro", "Password": "3.*RYhlG)lkA"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.2925388179.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.2925388179.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 8 entries
            SourceRuleDescriptionAuthorStrings
            0.2.LMxd0gpIxe.exe.35e0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.LMxd0gpIxe.exe.35e0000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.LMxd0gpIxe.exe.35e0000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x32641:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x326b3:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x3273d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x327cf:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x32839:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x328ab:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x32941:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x329d1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.2.LMxd0gpIxe.exe.35e0000.1.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                • 0x2f7d3:$s2: GetPrivateProfileString
                • 0x2eea1:$s3: get_OSFullName
                • 0x304d3:$s5: remove_Key
                • 0x306aa:$s5: remove_Key
                • 0x315db:$s6: FtpWebRequest
                • 0x32623:$s7: logins
                • 0x32b95:$s7: logins
                • 0x358a6:$s7: logins
                • 0x35958:$s7: logins
                • 0x372ad:$s7: logins
                • 0x364f2:$s9: 1.85 (Hash, version 2, native byte-order)
                0.2.LMxd0gpIxe.exe.35e0000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 9 entries
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 1.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.stingatoareincendii.ro", "Username": "mojooooofileeeee@stingatoareincendii.ro", "Password": "3.*RYhlG)lkA"}
                  Source: LMxd0gpIxe.exeReversingLabs: Detection: 63%
                  Source: LMxd0gpIxe.exeVirustotal: Detection: 73%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: LMxd0gpIxe.exeJoe Sandbox ML: detected
                  Source: LMxd0gpIxe.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: LMxd0gpIxe.exe, 00000000.00000003.1695278496.0000000003670000.00000004.00001000.00020000.00000000.sdmp, LMxd0gpIxe.exe, 00000000.00000003.1695971931.0000000003810000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: LMxd0gpIxe.exe, 00000000.00000003.1695278496.0000000003670000.00000004.00001000.00020000.00000000.sdmp, LMxd0gpIxe.exe, 00000000.00000003.1695971931.0000000003810000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0058445A
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058C6D1 FindFirstFileW,FindClose,0_2_0058C6D1
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0058C75C
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0058EF95
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0058F0F2
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0058F3F3
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005837EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_005837EF
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00583B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00583B12
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0058BCBC

                  Networking

                  barindex
                  Source: Yara matchFile source: 0.2.LMxd0gpIxe.exe.35e0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: global trafficTCP traffic: 192.168.2.4:60366 -> 1.1.1.1:53
                  Source: global trafficTCP traffic: 192.168.2.4:53734 -> 1.1.1.1:53
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005922EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_005922EE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: RegSvcs.exe, 00000001.00000002.2926410839.00000000027E1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2926410839.00000000028A8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2926410839.00000000028C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: LMxd0gpIxe.exe, 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2926410839.00000000027E1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2926410839.00000000028A8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2925388179.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: RegSvcs.exe, 00000001.00000002.2926410839.00000000027E1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2926410839.00000000028A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: LMxd0gpIxe.exe, 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2925388179.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00594164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00594164
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00594164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00594164
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00593F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00593F66
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0058001C
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005ACABC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_005ACABC

                  System Summary

                  barindex
                  Source: 0.2.LMxd0gpIxe.exe.35e0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.LMxd0gpIxe.exe.35e0000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.LMxd0gpIxe.exe.35e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.LMxd0gpIxe.exe.35e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: This is a third-party compiled AutoIt script.0_2_00523B3A
                  Source: LMxd0gpIxe.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: LMxd0gpIxe.exe, 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_234d79e4-a
                  Source: LMxd0gpIxe.exe, 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_3c309b8c-e
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00523633 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,0_2_00523633
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005AC1AC PostMessageW,GetFocus,GetDlgCtrlID,_memset,GetMenuItemInfoW,GetMenuItemCount,GetMenuItemID,GetMenuItemInfoW,GetMenuItemInfoW,CheckMenuRadioItem,NtdllDialogWndProc_W,0_2_005AC1AC
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005AC498 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,0_2_005AC498
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005AC57D SendMessageW,NtdllDialogWndProc_W,0_2_005AC57D
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005AC5FE DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,_wcscat,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,0_2_005AC5FE
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005AC860 NtdllDialogWndProc_W,0_2_005AC860
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005AC88F NtdllDialogWndProc_W,0_2_005AC88F
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005AC8BE NtdllDialogWndProc_W,0_2_005AC8BE
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005AC909 NtdllDialogWndProc_W,0_2_005AC909
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005AC93E ClientToScreen,NtdllDialogWndProc_W,0_2_005AC93E
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005ACA7C GetWindowLongW,NtdllDialogWndProc_W,0_2_005ACA7C
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005ACABC NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_005ACABC
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00521290 NtdllDialogWndProc_W,GetClientRect,GetCursorPos,ScreenToClient,0_2_00521290
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00521287 NtdllDialogWndProc_W,GetSysColor,SetBkColor,745EC8D0,NtdllDialogWndProc_W,0_2_00521287
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005AD3B8 NtdllDialogWndProc_W,0_2_005AD3B8
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005AD43E GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W,0_2_005AD43E
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0052167D NtdllDialogWndProc_W,0_2_0052167D
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005216DE GetParent,NtdllDialogWndProc_W,0_2_005216DE
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005216B5 NtdllDialogWndProc_W,0_2_005216B5
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005AD78C NtdllDialogWndProc_W,0_2_005AD78C
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0052189B NtdllDialogWndProc_W,0_2_0052189B
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005ABC5D NtdllDialogWndProc_W,CallWindowProcW,0_2_005ABC5D
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005ABF30 NtdllDialogWndProc_W,0_2_005ABF30
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005ABF8C ReleaseCapture,ChrCmpIA,SetWindowTextW,SendMessageW,NtdllDialogWndProc_W,0_2_005ABF8C
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0058A1EF
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00578310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,74755590,CreateProcessAsUserW,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,0_2_00578310
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005851BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_005851BD
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0052E6A00_2_0052E6A0
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0054D9750_2_0054D975
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0052FCE00_2_0052FCE0
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005421C50_2_005421C5
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005562D20_2_005562D2
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005A03DA0_2_005A03DA
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0055242E0_2_0055242E
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005425FA0_2_005425FA
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0057E6160_2_0057E616
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005366E10_2_005366E1
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0055878F0_2_0055878F
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005A08570_2_005A0857
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005568440_2_00556844
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005388080_2_00538808
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005888890_2_00588889
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0054CB210_2_0054CB21
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00556DB60_2_00556DB6
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00536F9E0_2_00536F9E
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005330300_2_00533030
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0054F1D90_2_0054F1D9
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005431870_2_00543187
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005212870_2_00521287
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005414840_2_00541484
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005355200_2_00535520
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005476960_2_00547696
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005357600_2_00535760
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005419780_2_00541978
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00559AB50_2_00559AB5
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005A7DDB0_2_005A7DDB
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00541D900_2_00541D90
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0054BDA60_2_0054BDA6
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0052DF000_2_0052DF00
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00533FE00_2_00533FE0
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0119F9580_2_0119F958
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00B0A6201_2_00B0A620
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00B0D9781_2_00B0D978
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00B04A801_2_00B04A80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00B09E601_2_00B09E60
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00B03E681_2_00B03E68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00B041B01_2_00B041B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_060224381_2_06022438
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_060212881_2_06021288
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_06023BD81_2_06023BD8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_060234F01_2_060234F0
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: String function: 00548900 appears 42 times
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: String function: 00540AE3 appears 70 times
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: String function: 00527DE1 appears 36 times
                  Source: LMxd0gpIxe.exe, 00000000.00000003.1696770322.0000000003793000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs LMxd0gpIxe.exe
                  Source: LMxd0gpIxe.exe, 00000000.00000003.1694974262.00000000038ED000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs LMxd0gpIxe.exe
                  Source: LMxd0gpIxe.exe, 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamee8300309-2878-4eb6-9fa4-d88c99cb9494.exe4 vs LMxd0gpIxe.exe
                  Source: LMxd0gpIxe.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 0.2.LMxd0gpIxe.exe.35e0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.LMxd0gpIxe.exe.35e0000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.LMxd0gpIxe.exe.35e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.LMxd0gpIxe.exe.35e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@1/1
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058A06A GetLastError,FormatMessageW,0_2_0058A06A
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005781CB AdjustTokenPrivileges,CloseHandle,0_2_005781CB
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005787E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_005787E1
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0058B333
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0059EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0059EE0D
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058C397 CoInitialize,CoCreateInstance,CoUninitialize,0_2_0058C397
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00524E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00524E89
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeFile created: C:\Users\user\AppData\Local\Temp\autA0AC.tmpJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegSvcs.exe, 00000001.00000002.2926410839.00000000028DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: LMxd0gpIxe.exeReversingLabs: Detection: 63%
                  Source: LMxd0gpIxe.exeVirustotal: Detection: 73%
                  Source: unknownProcess created: C:\Users\user\Desktop\LMxd0gpIxe.exe "C:\Users\user\Desktop\LMxd0gpIxe.exe"
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\LMxd0gpIxe.exe"
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\LMxd0gpIxe.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: Binary string: wntdll.pdbUGP source: LMxd0gpIxe.exe, 00000000.00000003.1695278496.0000000003670000.00000004.00001000.00020000.00000000.sdmp, LMxd0gpIxe.exe, 00000000.00000003.1695971931.0000000003810000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: LMxd0gpIxe.exe, 00000000.00000003.1695278496.0000000003670000.00000004.00001000.00020000.00000000.sdmp, LMxd0gpIxe.exe, 00000000.00000003.1695971931.0000000003810000.00000004.00001000.00020000.00000000.sdmp
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00647A10 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,0_2_00647A10
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0052C4C6 push A30052BAh; retn 0052h0_2_0052C50D
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058848F push FFFFFF8Bh; iretd 0_2_00588491
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0054E70F push edi; ret 0_2_0054E711
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0054E828 push esi; ret 0_2_0054E82A
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00548945 push ecx; ret 0_2_00548958
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0054EA03 push esi; ret 0_2_0054EA05
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0054EAEC push edi; ret 0_2_0054EAEE
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00522F12 push es; retf 0_2_00522F13
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_0602CB60 push es; ret 1_2_0602CB70
                  Source: initial sampleStatic PE information: section name: UPX0
                  Source: initial sampleStatic PE information: section name: UPX1
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005248D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_005248D7
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005A5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_005A5376
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00543187 RtlEncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00543187
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: Yara matchFile source: Process Memory Space: LMxd0gpIxe.exe PID: 6600, type: MEMORYSTR
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeAPI/Special instruction interceptor: Address: 119F57C
                  Source: LMxd0gpIxe.exe, 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2926410839.00000000028C2000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2925388179.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2926410839.0000000002815000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-101782
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeAPI coverage: 4.7 %
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0058445A
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058C6D1 FindFirstFileW,FindClose,0_2_0058C6D1
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0058C75C
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0058EF95
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0058F0F2
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0058F3F3
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005837EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_005837EF
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00583B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00583B12
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0058BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0058BCBC
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005249A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005249A0
                  Source: RegSvcs.exe, 00000001.00000002.2926410839.0000000002815000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: RegSvcs.exe, 00000001.00000002.2926410839.0000000002815000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                  Source: RegSvcs.exe, 00000001.00000002.2925388179.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                  Source: LMxd0gpIxe.exe, 00000000.00000003.1670420523.0000000000FD4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareworkstation.exe
                  Source: RegSvcs.exe, 00000001.00000002.2927639033.0000000005AA1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeAPI call chain: ExitProcess graph end nodegraph_0-100780
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeAPI call chain: ExitProcess graph end nodegraph_0-100534
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeAPI call chain: ExitProcess graph end nodegraph_0-103499

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_00B07068 CheckRemoteDebuggerPresent,1_2_00B07068
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00593F09 BlockInput,0_2_00593F09
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00523B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00523B3A
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00555A7C RtlEncodePointer,RtlEncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,GetProcAddress,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,0_2_00555A7C
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00647A10 EntryPoint,LoadLibraryA,GetProcAddress,ExitProcess,VirtualProtect,VirtualProtect,VirtualProtect,0_2_00647A10
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0119E1B8 mov eax, dword ptr fs:[00000030h]0_2_0119E1B8
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0119F7E8 mov eax, dword ptr fs:[00000030h]0_2_0119F7E8
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0119F848 mov eax, dword ptr fs:[00000030h]0_2_0119F848
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005780A9 GetTokenInformation,GetLastError,GetProcessHeap,RtlAllocateHeap,GetTokenInformation,0_2_005780A9
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0054A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0054A155
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0054A124 SetUnhandledExceptionFilter,0_2_0054A124
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 63A008Jump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005787B1 LogonUserW,0_2_005787B1
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00523B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00523B3A
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005248D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_005248D7
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00584C53 mouse_event,0_2_00584C53
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\LMxd0gpIxe.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00577CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00577CAF
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0057874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0057874B
                  Source: LMxd0gpIxe.exe, 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: LMxd0gpIxe.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_0054862B cpuid 0_2_0054862B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00554E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00554E87
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00561E06 GetUserNameW,0_2_00561E06
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00553F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00553F3A
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_005249A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005249A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.2.LMxd0gpIxe.exe.35e0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.LMxd0gpIxe.exe.35e0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2925388179.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: LMxd0gpIxe.exe PID: 6600, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2872, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: LMxd0gpIxe.exeBinary or memory string: WIN_81
                  Source: LMxd0gpIxe.exeBinary or memory string: WIN_XP
                  Source: LMxd0gpIxe.exeBinary or memory string: WIN_XPe
                  Source: LMxd0gpIxe.exeBinary or memory string: WIN_VISTA
                  Source: LMxd0gpIxe.exeBinary or memory string: WIN_7
                  Source: LMxd0gpIxe.exeBinary or memory string: WIN_8
                  Source: LMxd0gpIxe.exe, 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 0.2.LMxd0gpIxe.exe.35e0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.LMxd0gpIxe.exe.35e0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2925388179.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000001.00000002.2926410839.0000000002815000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: LMxd0gpIxe.exe PID: 6600, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2872, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.2.LMxd0gpIxe.exe.35e0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.LMxd0gpIxe.exe.35e0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2925388179.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: LMxd0gpIxe.exe PID: 6600, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 2872, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00596283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00596283
                  Source: C:\Users\user\Desktop\LMxd0gpIxe.exeCode function: 0_2_00596747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00596747
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  11
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  2
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Native API
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                  Valid Accounts
                  21
                  Obfuscated Files or Information
                  Security Account Manager2
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  Software Packing
                  NTDS138
                  System Information Discovery
                  Distributed Component Object Model21
                  Input Capture
                  2
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                  Process Injection
                  1
                  DLL Side-Loading
                  LSA Secrets651
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                  Valid Accounts
                  Cached Domain Credentials22
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
                  Virtualization/Sandbox Evasion
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                  Access Token Manipulation
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                  Process Injection
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                  System Network Configuration Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  LMxd0gpIxe.exe63%ReversingLabsWin32.Trojan.AutoitInject
                  LMxd0gpIxe.exe73%VirustotalBrowse
                  LMxd0gpIxe.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://ip-api.com/line/?fields=hostingfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://account.dyn.com/LMxd0gpIxe.exe, 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2925388179.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.2926410839.00000000027E1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2926410839.00000000028A8000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://ip-api.comRegSvcs.exe, 00000001.00000002.2926410839.00000000027E1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2926410839.00000000028A8000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2926410839.00000000028C2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            208.95.112.1
                            ip-api.comUnited States
                            53334TUT-ASUSfalse
                            Joe Sandbox version:42.0.0 Malachite
                            Analysis ID:1588366
                            Start date and time:2025-01-11 01:24:09 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 28s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:6
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:LMxd0gpIxe.exe
                            renamed because original name is a hash value
                            Original Sample Name:15c74162d5e448d5691900c39f7c8c9939204bcff280eb316fdd6802a3a28f3a.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/2@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 56
                            • Number of non-executed functions: 272
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                            • Excluded IPs from analysis (whitelisted): 4.245.163.56, 20.3.187.198, 13.107.246.45
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Not all processes where analyzed, report is missing behavior information
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            208.95.112.1rComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            e4Iw3lwFJ5.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            uOCavrYu1y.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            XoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            7569qiv4L2.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            hCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            sDflTDPSLw.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            2HCwqwLg1G.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ip-api.comrComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            e4Iw3lwFJ5.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            uOCavrYu1y.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            XoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            7569qiv4L2.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            hCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            sDflTDPSLw.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            2HCwqwLg1G.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            TUT-ASUSrComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            e4Iw3lwFJ5.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            uOCavrYu1y.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            XoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            7569qiv4L2.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            hCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            sDflTDPSLw.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            2HCwqwLg1G.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            No context
                            No context
                            Process:C:\Users\user\Desktop\LMxd0gpIxe.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):154276
                            Entropy (8bit):7.909366410420752
                            Encrypted:false
                            SSDEEP:3072:9CG+K7EJLRkNC8SemRqP/BXFuUg7uMySgR4mMvalOuXALWEf+WFAjec4Ri:9CRK7QkApenP/B18uMySJmBJXA6Ef+W4
                            MD5:03594F126C16F5C020C1FA2B070D60D6
                            SHA1:DD1D73B50F175D5A5E508CCB45A993C17084F900
                            SHA-256:2C80B58C29B2504D2D5CAA4C6C5461DC082B7F1CA0BF76CEB5F1AB2BC8B505EB
                            SHA-512:A917DDFB3D07421D7BA95A80DD300697666841789816880626E9A1C58170A80731C8F88969FFBED723053D7D26FCADC5B065FFCD4CEFB3964A5FDF63BEBC7CDF
                            Malicious:false
                            Reputation:low
                            Preview:EA06......t..iQ.Shu]_6.E..&UJU..8.. ....X.L..ZX..j`...,.X.V..j..q...h..u..Z..t...[6..nr...>.[d3...g+..k.Ht.3..Hj.8.r.G..,f...Q ..;......5..L*..-.qS..M...lJ1T......v*....D.....5...5..........a.D.'....%t...Qir...P.1.^.X,5@..].`._<.8.......-.q:...0.....v.:.O......W.,.^JM..:.X.ms....6.......,m@....a.7|.I...e.U..Y=*q_...s.......M|.Jm...a..3.p....,L*..${CQ.}nsZ...U.n.....-U......y._%..<....h$\..W.Y...;....!.O.<..~.K.qx.M..cL....L....R.._.a..M.7w...Bd...*K..^.}.[m..~/6.dN...V.S.#.*.ret......#....ox.L"q.w....J*...i:.M..)=Ja6.~.......br..gS.X._.v.u2.`.O.~.Gw3~.L...{.J..$........n......J.7.P..5..!.c.....`..V.XE.....a.......y'..@B+........].;mz.a3pI.nkc.[3...s...G&0...W...aP-.Fy..K..:$r.@....N.7.P.......pp....aT.R..j.>....|.]....r=]J/....K.4..lmh....a..Tw`..Re....4G.k8...m.G.M.N..T..L..'...^.8.Y..X.v.%.Wg.9..'uzD....j.....A.l%q.%*y...h.J..7C..)..-.y.....,..1.G.ti...T.N.....b....d.q2..).Y0.aC.VfUJu..:.Nf4i...O.J$s*5..r.I)TJ.b.N.Q.t}.2....!....e^..7.8..q5..-1.
                            Process:C:\Users\user\Desktop\LMxd0gpIxe.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):244224
                            Entropy (8bit):6.679210992396976
                            Encrypted:false
                            SSDEEP:6144:kY7D2VX7SYNp0NMW2VDLkpb+9yZTOdjUPqvrox/1wYeL/VBiU/D1jPQU4P8AkYvr:zdmozy/rHdGhB
                            MD5:21A8394C600BBB50B6332A6E27411749
                            SHA1:BA6ACBBC88FE0DB9926FBE7A2876676E2D70D82B
                            SHA-256:379CE867BB6C52ADBF2FDFC4EF0C63713A63E05C1B4C0C2419E925E02CCB67CB
                            SHA-512:73A05DF82585B34BAA26344FFBB1A23C1F7A81463F7D298A421149EEA265B19C6A5C87553F6C3D711F6C3AC6D5A98A5063B92207583379E750F580462A3ACAE8
                            Malicious:false
                            Reputation:low
                            Preview:.b.N2F4Q@MCU..FE.82TJDJ8.N1F4QDMCUT2FEK82TJDJ8SN1F4QDMCUT2FE.82TD[.6S.8...E..t.Z/6kH@;-6+Us-P(Z>0m!0t@3+kQ\t....>!U#.\IGgUT2FEK8b.JD.9PN...4DMCUT2FE.80UAEA8S.2F4YDMCUT2(.H82tJDJ.PN1FtQDmCUT0FEO82TJDJ8WN1F4QDMCuP2FGK82TJDH8..1F$QD]CUT2VEK(2TJDJ8CN1F4QDMCUT2^.H8aTJDJ.PNwC4QDMCUT2FEK82TJDJ8SN5F8QDMCUT2FEK82TJDJ8SN1F4QDMCUT2FEK82TJDJ8SN1F4QDMCUT2FeK8:TJDJ8SN1F4QLmCU.2FEK82TJDJ8}:T>@QDM7.W2FeK82.IDJ:SN1F4QDMCUT2FEk824d69J0N1FrTDMC.W2FCK82.IDJ8SN1F4QDMCU.2F.eJW8%'J8_N1F4Q@MCWT2F.H82TJDJ8SN1F4Q.MC.T2FEK82TJDJ8SN1Fd.GMCUT2.EK80TOD..QN.s5QGMCUU2FCK82TJDJ8SN1F4QDMCUT2FEK82TJDJ8SN1F4QDMCUT2FEK82TW.....yx|,zG!R...".;..Y..A..>.!.?Y..tK....m1L..N.I...J...0.07-K......&? J%."{='.V....ykL...@Z.>...*..+M..}....p..x^0....F..(W_z+4:T6`b'R06$.W.3FEK8......X>..iNLK` >...~V2n...JQDM'UT24EK8STJD.8SN^F4Q*MCU*2FE582T.DJ8.N1F.QDMfUT2+EK8.TJD48SN.;;^...<'..EK82T.....#....z...7.5cPl...\....1..B+.#q....<./..D.Z@...JBSP7DBO;>iD....o3B0TFJGVX.H....u.b..j...E..../.NFEK82T.DJ.SN1.Q.MCU.2.E.2TJ.8.N.F...M
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                            Entropy (8bit):7.8740077587620725
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.39%
                            • UPX compressed Win32 Executable (30571/9) 0.30%
                            • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            File name:LMxd0gpIxe.exe
                            File size:678'400 bytes
                            MD5:92fff178a6c268dd0af4bc3b420fb0f3
                            SHA1:5c4b1183dfbab7cf9f03eaa1db63603a63596d51
                            SHA256:15c74162d5e448d5691900c39f7c8c9939204bcff280eb316fdd6802a3a28f3a
                            SHA512:b424ade6133e5f46bf17552e44e80791216d26d10adf67833ba167e76e4c3e131b59be5420ea976367fb9ef397f93b88bf78595bbae957d954999090786c44fc
                            SSDEEP:12288:IquErHF6xC9D6DmR1J98w4oknqOOCyQfq3DlU8STGTl8xUhjM5:Jrl6kD68JmlotQfADlvTl80ja
                            TLSH:EFE4F18D5C2D48ABE4D5BE31D827387031A26DA3CC449A8E65B6BC4FF5A701118FDC6E
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                            Icon Hash:b17169ecc6c4718d
                            Entrypoint:0x527a10
                            Entrypoint Section:UPX1
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                            Time Stamp:0x6752DE4C [Fri Dec 6 11:21:48 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:fc6683d30d9f25244a50fd5357825e79
                            Instruction
                            pushad
                            mov esi, 004D2000h
                            lea edi, dword ptr [esi-000D1000h]
                            push edi
                            jmp 00007FBBB09BBF9Dh
                            nop
                            mov al, byte ptr [esi]
                            inc esi
                            mov byte ptr [edi], al
                            inc edi
                            add ebx, ebx
                            jne 00007FBBB09BBF99h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jc 00007FBBB09BBF7Fh
                            mov eax, 00000001h
                            add ebx, ebx
                            jne 00007FBBB09BBF99h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            adc eax, eax
                            add ebx, ebx
                            jnc 00007FBBB09BBF9Dh
                            jne 00007FBBB09BBFBAh
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jc 00007FBBB09BBFB1h
                            dec eax
                            add ebx, ebx
                            jne 00007FBBB09BBF99h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            adc eax, eax
                            jmp 00007FBBB09BBF66h
                            add ebx, ebx
                            jne 00007FBBB09BBF99h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            adc ecx, ecx
                            jmp 00007FBBB09BBFE4h
                            xor ecx, ecx
                            sub eax, 03h
                            jc 00007FBBB09BBFA3h
                            shl eax, 08h
                            mov al, byte ptr [esi]
                            inc esi
                            xor eax, FFFFFFFFh
                            je 00007FBBB09BC007h
                            sar eax, 1
                            mov ebp, eax
                            jmp 00007FBBB09BBF9Dh
                            add ebx, ebx
                            jne 00007FBBB09BBF99h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jc 00007FBBB09BBF5Eh
                            inc ecx
                            add ebx, ebx
                            jne 00007FBBB09BBF99h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jc 00007FBBB09BBF50h
                            add ebx, ebx
                            jne 00007FBBB09BBF99h
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            adc ecx, ecx
                            add ebx, ebx
                            jnc 00007FBBB09BBF81h
                            jne 00007FBBB09BBF9Bh
                            mov ebx, dword ptr [esi]
                            sub esi, FFFFFFFCh
                            adc ebx, ebx
                            jnc 00007FBBB09BBF76h
                            add ecx, 02h
                            cmp ebp, FFFFFB00h
                            adc ecx, 02h
                            lea edx, dword ptr [edi+ebp]
                            cmp ebp, FFFFFFFCh
                            jbe 00007FBBB09BBFA0h
                            mov al, byte ptr [edx]
                            Programming Language:
                            • [ASM] VS2013 build 21005
                            • [ C ] VS2013 build 21005
                            • [C++] VS2013 build 21005
                            • [ C ] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            • [ASM] VS2013 UPD4 build 31101
                            • [RES] VS2013 build 21005
                            • [LNK] VS2013 UPD4 build 31101
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x1772b00x424.rsrc
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x1280000x4f2b0.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1776d40xc.rsrc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x127bf40x48UPX1
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            UPX00x10000xd10000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            UPX10xd20000x560000x55e000c9e5b3ac99a6ce01bd2977e941e0f05False0.9871724890829694data7.93532194340387IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x1280000x500000x4f80084f2baac5b78bee1a0740007d95070e8False0.7558194526336478data7.697924049494884IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0x12845c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                            RT_ICON0x1285880x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                            RT_ICON0x1286b40x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                            RT_ICON0x1287e00x16b70Device independent bitmap graphic, 150 x 300 x 32, image size 90000EnglishGreat Britain0.1676268271711092
                            RT_MENU0xde3400x50dataEnglishGreat Britain1.1375
                            RT_STRING0xde3900x594dataEnglishGreat Britain1.007703081232493
                            RT_STRING0xde9240x68adataEnglishGreat Britain1.0065710872162486
                            RT_STRING0xdefb00x490dataEnglishGreat Britain1.009417808219178
                            RT_STRING0xdf4400x5fcdataEnglishGreat Britain1.0071801566579635
                            RT_STRING0xdfa3c0x65cdataEnglishGreat Britain0.9981572481572482
                            RT_STRING0xe00980x466dataEnglishGreat Britain0.9698046181172292
                            RT_STRING0xe05000x158dataEnglishGreat Britain1.0319767441860466
                            RT_RCDATA0x13f3540x37a25data1.0003335132549578
                            RT_GROUP_ICON0x176d800x14dataEnglishGreat Britain1.25
                            RT_GROUP_ICON0x176d980x14dataEnglishGreat Britain1.25
                            RT_GROUP_ICON0x176db00x14dataEnglishGreat Britain1.15
                            RT_GROUP_ICON0x176dc80x14dataEnglishGreat Britain1.25
                            RT_VERSION0x176de00xdcdataEnglishGreat Britain0.6181818181818182
                            RT_MANIFEST0x176ec00x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                            DLLImport
                            KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
                            ADVAPI32.dllGetAce
                            COMCTL32.dllImageList_Remove
                            COMDLG32.dllGetOpenFileNameW
                            GDI32.dllLineTo
                            IPHLPAPI.DLLIcmpSendEcho
                            MPR.dllWNetUseConnectionW
                            ole32.dllCoGetObject
                            OLEAUT32.dllVariantInit
                            PSAPI.DLLGetProcessMemoryInfo
                            SHELL32.dllDragFinish
                            USER32.dllGetDC
                            USERENV.dllLoadUserProfileW
                            UxTheme.dllIsThemeActive
                            VERSION.dllVerQueryValueW
                            WININET.dllFtpOpenFileW
                            WINMM.dlltimeGetTime
                            WSOCK32.dllconnect
                            Language of compilation systemCountry where language is spokenMap
                            EnglishGreat Britain
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 11, 2025 01:25:03.796153069 CET4973080192.168.2.4208.95.112.1
                            Jan 11, 2025 01:25:03.801027060 CET8049730208.95.112.1192.168.2.4
                            Jan 11, 2025 01:25:03.801111937 CET4973080192.168.2.4208.95.112.1
                            Jan 11, 2025 01:25:03.802077055 CET4973080192.168.2.4208.95.112.1
                            Jan 11, 2025 01:25:03.806832075 CET8049730208.95.112.1192.168.2.4
                            Jan 11, 2025 01:25:04.263281107 CET8049730208.95.112.1192.168.2.4
                            Jan 11, 2025 01:25:04.304645061 CET4973080192.168.2.4208.95.112.1
                            Jan 11, 2025 01:25:23.124526978 CET5373453192.168.2.41.1.1.1
                            Jan 11, 2025 01:25:23.129362106 CET53537341.1.1.1192.168.2.4
                            Jan 11, 2025 01:25:23.129440069 CET5373453192.168.2.41.1.1.1
                            Jan 11, 2025 01:25:23.134432077 CET53537341.1.1.1192.168.2.4
                            Jan 11, 2025 01:25:23.598325014 CET5373453192.168.2.41.1.1.1
                            Jan 11, 2025 01:25:23.603559017 CET53537341.1.1.1192.168.2.4
                            Jan 11, 2025 01:25:23.603660107 CET5373453192.168.2.41.1.1.1
                            Jan 11, 2025 01:25:25.624521971 CET6036653192.168.2.41.1.1.1
                            Jan 11, 2025 01:25:25.629373074 CET53603661.1.1.1192.168.2.4
                            Jan 11, 2025 01:25:25.629446983 CET6036653192.168.2.41.1.1.1
                            Jan 11, 2025 01:25:25.634645939 CET53603661.1.1.1192.168.2.4
                            Jan 11, 2025 01:25:26.077828884 CET6036653192.168.2.41.1.1.1
                            Jan 11, 2025 01:25:26.088314056 CET53603661.1.1.1192.168.2.4
                            Jan 11, 2025 01:25:26.088990927 CET6036653192.168.2.41.1.1.1
                            Jan 11, 2025 01:26:07.428945065 CET8049730208.95.112.1192.168.2.4
                            Jan 11, 2025 01:26:07.429032087 CET4973080192.168.2.4208.95.112.1
                            Jan 11, 2025 01:26:44.282134056 CET4973080192.168.2.4208.95.112.1
                            Jan 11, 2025 01:26:44.286947012 CET8049730208.95.112.1192.168.2.4
                            TimestampSource PortDest PortSource IPDest IP
                            Jan 11, 2025 01:25:03.782633066 CET4942153192.168.2.41.1.1.1
                            Jan 11, 2025 01:25:03.790152073 CET53494211.1.1.1192.168.2.4
                            Jan 11, 2025 01:25:23.124067068 CET53601871.1.1.1192.168.2.4
                            Jan 11, 2025 01:25:25.624079943 CET53644351.1.1.1192.168.2.4
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jan 11, 2025 01:25:03.782633066 CET192.168.2.41.1.1.10x73f9Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jan 11, 2025 01:25:03.790152073 CET1.1.1.1192.168.2.40x73f9No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                            • ip-api.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.449730208.95.112.1802872C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            TimestampBytes transferredDirectionData
                            Jan 11, 2025 01:25:03.802077055 CET80OUTGET /line/?fields=hosting HTTP/1.1
                            Host: ip-api.com
                            Connection: Keep-Alive
                            Jan 11, 2025 01:25:04.263281107 CET175INHTTP/1.1 200 OK
                            Date: Sat, 11 Jan 2025 00:25:03 GMT
                            Content-Type: text/plain; charset=utf-8
                            Content-Length: 6
                            Access-Control-Allow-Origin: *
                            X-Ttl: 60
                            X-Rl: 44
                            Data Raw: 66 61 6c 73 65 0a
                            Data Ascii: false


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:19:24:59
                            Start date:10/01/2025
                            Path:C:\Users\user\Desktop\LMxd0gpIxe.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\LMxd0gpIxe.exe"
                            Imagebase:0x520000
                            File size:678'400 bytes
                            MD5 hash:92FFF178A6C268DD0AF4BC3B420FB0F3
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.1700553412.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:19:25:01
                            Start date:10/01/2025
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\LMxd0gpIxe.exe"
                            Imagebase:0x480000
                            File size:45'984 bytes
                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2925388179.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2925388179.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2926410839.0000000002815000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:4.2%
                              Dynamic/Decrypted Code Coverage:0.4%
                              Signature Coverage:8.2%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:174
                              execution_graph 100371 523633 100372 52366a 100371->100372 100373 5236e7 100372->100373 100374 523688 100372->100374 100410 5236e5 100372->100410 100376 55d0cc 100373->100376 100377 5236ed 100373->100377 100378 523695 100374->100378 100379 52374b PostQuitMessage 100374->100379 100375 5236ca NtdllDefWindowProc_W 100402 5236d8 100375->100402 100426 531070 10 API calls Mailbox 100376->100426 100382 5236f2 100377->100382 100383 523715 SetTimer RegisterClipboardFormatW 100377->100383 100380 55d154 100378->100380 100381 5236a0 100378->100381 100379->100402 100442 582527 71 API calls _memset 100380->100442 100386 523755 100381->100386 100387 5236a8 100381->100387 100390 55d06f 100382->100390 100391 5236f9 KillTimer 100382->100391 100388 52373e CreatePopupMenu 100383->100388 100383->100402 100385 55d0f3 100427 531093 331 API calls Mailbox 100385->100427 100416 5244a0 100386->100416 100393 5236b3 100387->100393 100394 55d139 100387->100394 100388->100402 100397 55d074 100390->100397 100398 55d0a8 MoveWindow 100390->100398 100423 52443a Shell_NotifyIconW _memset 100391->100423 100400 5236be 100393->100400 100401 55d124 100393->100401 100394->100375 100441 577c36 59 API calls Mailbox 100394->100441 100395 55d166 100395->100375 100395->100402 100403 55d097 SetFocus 100397->100403 100404 55d078 100397->100404 100398->100402 100400->100375 100428 52443a Shell_NotifyIconW _memset 100400->100428 100440 582d36 81 API calls _memset 100401->100440 100403->100402 100404->100400 100406 55d081 100404->100406 100405 52370c 100424 523114 DeleteObject DestroyWindow Mailbox 100405->100424 100425 531070 10 API calls Mailbox 100406->100425 100410->100375 100412 55d134 100412->100402 100414 55d118 100429 52434a 100414->100429 100417 5244b7 _memset 100416->100417 100418 524539 100416->100418 100443 52407c 100417->100443 100418->100402 100420 524522 KillTimer SetTimer 100420->100418 100421 5244de 100421->100420 100422 55d4ab Shell_NotifyIconW 100421->100422 100422->100420 100423->100405 100424->100402 100425->100402 100426->100385 100427->100400 100428->100414 100430 524375 _memset 100429->100430 100562 524182 100430->100562 100433 5243fa 100435 524430 Shell_NotifyIconW 100433->100435 100436 524414 Shell_NotifyIconW 100433->100436 100437 524422 100435->100437 100436->100437 100438 52407c 61 API calls 100437->100438 100439 524429 100438->100439 100439->100410 100440->100412 100441->100410 100442->100395 100444 524098 100443->100444 100445 52416f Mailbox 100443->100445 100465 527a16 100444->100465 100445->100421 100448 5240b3 100470 527bcc 100448->100470 100449 55d3c8 LoadStringW 100452 55d3e2 100449->100452 100451 5240c8 100451->100452 100453 5240d9 100451->100453 100454 527b2e 59 API calls 100452->100454 100455 5240e3 100453->100455 100456 524174 100453->100456 100459 55d3ec 100454->100459 100479 527b2e 100455->100479 100488 528047 100456->100488 100462 5240ed _memset _wcscpy 100459->100462 100492 527cab 100459->100492 100461 55d40e 100463 527cab 59 API calls 100461->100463 100464 524155 Shell_NotifyIconW 100462->100464 100463->100462 100464->100445 100499 540db6 100465->100499 100467 527a3b 100509 528029 100467->100509 100471 527c45 100470->100471 100473 527bd8 __wsetenvp 100470->100473 100541 527d2c 100471->100541 100474 527c13 100473->100474 100475 527bee 100473->100475 100476 528029 59 API calls 100474->100476 100540 527f27 59 API calls Mailbox 100475->100540 100478 527bf6 _memmove 100476->100478 100478->100451 100480 527b40 100479->100480 100481 55ec6b 100479->100481 100549 527a51 100480->100549 100555 577bdb 59 API calls _memmove 100481->100555 100484 527b4c 100484->100462 100485 55ec75 100486 528047 59 API calls 100485->100486 100487 55ec7d Mailbox 100486->100487 100489 528052 100488->100489 100490 52805a 100488->100490 100556 527f77 59 API calls 2 library calls 100489->100556 100490->100462 100493 527cbf 100492->100493 100494 55ed4a 100492->100494 100557 527c50 100493->100557 100496 528029 59 API calls 100494->100496 100498 55ed55 __wsetenvp _memmove 100496->100498 100497 527cca 100497->100461 100501 540dbe 100499->100501 100502 540dd8 100501->100502 100504 540ddc std::exception::exception 100501->100504 100512 54571c 100501->100512 100529 5433a1 RtlDecodePointer 100501->100529 100502->100467 100530 54859b RaiseException 100504->100530 100506 540e06 100531 5484d1 58 API calls _free 100506->100531 100508 540e18 100508->100467 100510 540db6 Mailbox 59 API calls 100509->100510 100511 5240a6 100510->100511 100511->100448 100511->100449 100513 545797 100512->100513 100517 545728 100512->100517 100538 5433a1 RtlDecodePointer 100513->100538 100515 54579d 100539 548b28 58 API calls __getptd_noexit 100515->100539 100519 545733 100517->100519 100520 54575b RtlAllocateHeap 100517->100520 100523 545783 100517->100523 100527 545781 100517->100527 100535 5433a1 RtlDecodePointer 100517->100535 100519->100517 100532 54a16b 58 API calls __NMSG_WRITE 100519->100532 100533 54a1c8 58 API calls 6 library calls 100519->100533 100534 54309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100519->100534 100520->100517 100521 54578f 100520->100521 100521->100501 100536 548b28 58 API calls __getptd_noexit 100523->100536 100537 548b28 58 API calls __getptd_noexit 100527->100537 100529->100501 100530->100506 100531->100508 100532->100519 100533->100519 100535->100517 100536->100527 100537->100521 100538->100515 100539->100521 100540->100478 100542 527d43 _memmove 100541->100542 100543 527d3a 100541->100543 100542->100478 100543->100542 100545 527e4f 100543->100545 100546 527e62 100545->100546 100548 527e5f _memmove 100545->100548 100547 540db6 Mailbox 59 API calls 100546->100547 100547->100548 100548->100542 100550 527a5f 100549->100550 100551 527a85 _memmove 100549->100551 100550->100551 100552 540db6 Mailbox 59 API calls 100550->100552 100551->100484 100553 527ad4 100552->100553 100554 540db6 Mailbox 59 API calls 100553->100554 100554->100551 100555->100485 100556->100490 100558 527c5f __wsetenvp 100557->100558 100559 528029 59 API calls 100558->100559 100560 527c70 _memmove 100558->100560 100561 55ed07 _memmove 100559->100561 100560->100497 100563 524196 100562->100563 100564 55d423 100562->100564 100563->100433 100566 582f94 62 API calls _W_store_winword 100563->100566 100564->100563 100565 55d42c DestroyCursor 100564->100565 100565->100563 100566->100433 100567 119e6f8 100581 119c348 100567->100581 100569 119e7c5 100584 119e5e8 100569->100584 100587 119f7e8 GetPEB 100581->100587 100583 119c9d3 100583->100569 100585 119e5f1 Sleep 100584->100585 100586 119e5ff 100585->100586 100588 119f812 100587->100588 100588->100583 100589 547c56 100590 547c62 __getstream 100589->100590 100626 549e08 GetStartupInfoW 100590->100626 100592 547c67 100628 548b7c GetProcessHeap 100592->100628 100594 547cbf 100595 547cca 100594->100595 100711 547da6 58 API calls 3 library calls 100594->100711 100629 549ae6 100595->100629 100598 547cd0 100599 547cdb __RTC_Initialize 100598->100599 100712 547da6 58 API calls 3 library calls 100598->100712 100650 54d5d2 100599->100650 100602 547cea 100603 547cf6 GetCommandLineW 100602->100603 100713 547da6 58 API calls 3 library calls 100602->100713 100669 554f23 GetEnvironmentStringsW 100603->100669 100606 547cf5 100606->100603 100609 547d10 100610 547d1b 100609->100610 100714 5430b5 58 API calls 3 library calls 100609->100714 100679 554d58 100610->100679 100613 547d21 100614 547d2c 100613->100614 100715 5430b5 58 API calls 3 library calls 100613->100715 100693 5430ef 100614->100693 100617 547d34 100618 547d3f __wwincmdln 100617->100618 100716 5430b5 58 API calls 3 library calls 100617->100716 100699 5247d0 100618->100699 100621 547d53 100622 547d62 100621->100622 100717 543358 58 API calls _doexit 100621->100717 100718 5430e0 58 API calls _doexit 100622->100718 100625 547d67 __getstream 100627 549e1e 100626->100627 100627->100592 100628->100594 100719 543187 36 API calls 2 library calls 100629->100719 100631 549aeb 100720 549d3c InitializeCriticalSectionAndSpinCount __getstream 100631->100720 100633 549af4 100721 549b5c 61 API calls 2 library calls 100633->100721 100634 549af0 100634->100633 100722 549d8a TlsAlloc 100634->100722 100637 549af9 100637->100598 100638 549b06 100638->100633 100639 549b11 100638->100639 100723 5487d5 100639->100723 100642 549b53 100731 549b5c 61 API calls 2 library calls 100642->100731 100645 549b58 100645->100598 100646 549b32 100646->100642 100647 549b38 100646->100647 100730 549a33 58 API calls 4 library calls 100647->100730 100649 549b40 GetCurrentThreadId 100649->100598 100651 54d5de __getstream 100650->100651 100743 549c0b 100651->100743 100653 54d5e5 100654 5487d5 __calloc_crt 58 API calls 100653->100654 100656 54d5f6 100654->100656 100655 54d601 @_EH4_CallFilterFunc@8 __getstream 100655->100602 100656->100655 100657 54d661 GetStartupInfoW 100656->100657 100663 54d676 100657->100663 100666 54d7a5 100657->100666 100658 54d86d 100752 54d87d RtlLeaveCriticalSection _doexit 100658->100752 100660 5487d5 __calloc_crt 58 API calls 100660->100663 100661 54d7f2 GetStdHandle 100661->100666 100662 54d805 GetFileType 100662->100666 100663->100660 100664 54d6c4 100663->100664 100663->100666 100665 54d6f8 GetFileType 100664->100665 100664->100666 100750 549e2b InitializeCriticalSectionAndSpinCount 100664->100750 100665->100664 100666->100658 100666->100661 100666->100662 100751 549e2b InitializeCriticalSectionAndSpinCount 100666->100751 100670 554f34 100669->100670 100671 547d06 100669->100671 100792 54881d 58 API calls 2 library calls 100670->100792 100675 554b1b GetModuleFileNameW 100671->100675 100673 554f5a _memmove 100674 554f70 FreeEnvironmentStringsW 100673->100674 100674->100671 100677 554b4f _wparse_cmdline 100675->100677 100676 554b8f _wparse_cmdline 100676->100609 100677->100676 100793 54881d 58 API calls 2 library calls 100677->100793 100680 554d71 __wsetenvp 100679->100680 100684 554d69 100679->100684 100681 5487d5 __calloc_crt 58 API calls 100680->100681 100689 554d9a __wsetenvp 100681->100689 100682 554df1 100683 542d55 _free 58 API calls 100682->100683 100683->100684 100684->100613 100685 5487d5 __calloc_crt 58 API calls 100685->100689 100686 554e16 100687 542d55 _free 58 API calls 100686->100687 100687->100684 100689->100682 100689->100684 100689->100685 100689->100686 100690 554e2d 100689->100690 100794 554607 58 API calls __Wcsftime_l 100689->100794 100795 548dc6 IsProcessorFeaturePresent 100690->100795 100692 554e39 100692->100613 100694 5430fb __IsNonwritableInCurrentImage 100693->100694 100818 54a4d1 100694->100818 100696 543119 __initterm_e 100698 543138 _doexit __IsNonwritableInCurrentImage 100696->100698 100821 542d40 100696->100821 100698->100617 100700 5247ea 100699->100700 100710 524889 100699->100710 100701 524824 745EC8D0 100700->100701 100856 54336c 100701->100856 100705 524850 100868 5248fd SystemParametersInfoW SystemParametersInfoW 100705->100868 100707 52485c 100869 523b3a 100707->100869 100709 524864 SystemParametersInfoW 100709->100710 100710->100621 100711->100595 100712->100599 100713->100606 100717->100622 100718->100625 100719->100631 100720->100634 100721->100637 100722->100638 100724 5487dc 100723->100724 100726 548817 100724->100726 100728 5487fa 100724->100728 100732 5551f6 100724->100732 100726->100642 100729 549de6 TlsSetValue 100726->100729 100728->100724 100728->100726 100740 54a132 Sleep 100728->100740 100729->100646 100730->100649 100731->100645 100733 555201 100732->100733 100737 55521c 100732->100737 100734 55520d 100733->100734 100733->100737 100741 548b28 58 API calls __getptd_noexit 100734->100741 100736 55522c RtlAllocateHeap 100736->100737 100738 555212 100736->100738 100737->100736 100737->100738 100742 5433a1 RtlDecodePointer 100737->100742 100738->100724 100740->100728 100741->100738 100742->100737 100744 549c1c 100743->100744 100745 549c2f RtlEnterCriticalSection 100743->100745 100753 549c93 100744->100753 100745->100653 100747 549c22 100747->100745 100777 5430b5 58 API calls 3 library calls 100747->100777 100750->100664 100751->100666 100752->100655 100754 549c9f __getstream 100753->100754 100755 549cc0 100754->100755 100756 549ca8 100754->100756 100769 549ce1 __getstream 100755->100769 100781 54881d 58 API calls 2 library calls 100755->100781 100778 54a16b 58 API calls __NMSG_WRITE 100756->100778 100759 549cad 100779 54a1c8 58 API calls 6 library calls 100759->100779 100760 549cd5 100762 549cdc 100760->100762 100763 549ceb 100760->100763 100782 548b28 58 API calls __getptd_noexit 100762->100782 100766 549c0b __lock 58 API calls 100763->100766 100764 549cb4 100780 54309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100764->100780 100770 549cf2 100766->100770 100769->100747 100771 549d17 100770->100771 100772 549cff 100770->100772 100784 542d55 100771->100784 100783 549e2b InitializeCriticalSectionAndSpinCount 100772->100783 100775 549d0b 100790 549d33 RtlLeaveCriticalSection _doexit 100775->100790 100778->100759 100779->100764 100781->100760 100782->100769 100783->100775 100785 542d5e RtlFreeHeap 100784->100785 100786 542d87 __dosmaperr 100784->100786 100785->100786 100787 542d73 100785->100787 100786->100775 100791 548b28 58 API calls __getptd_noexit 100787->100791 100789 542d79 GetLastError 100789->100786 100790->100769 100791->100789 100792->100673 100793->100676 100794->100689 100796 548dd1 100795->100796 100801 548c59 100796->100801 100800 548dec 100800->100692 100802 548c73 _memset ___raise_securityfailure 100801->100802 100803 548c93 IsDebuggerPresent 100802->100803 100809 54a155 SetUnhandledExceptionFilter UnhandledExceptionFilter 100803->100809 100806 548d7a 100808 54a140 GetCurrentProcess TerminateProcess 100806->100808 100807 548d57 ___raise_securityfailure 100810 54c5f6 100807->100810 100808->100800 100809->100807 100811 54c600 IsProcessorFeaturePresent 100810->100811 100812 54c5fe 100810->100812 100814 55590a 100811->100814 100812->100806 100817 5558b9 5 API calls 2 library calls 100814->100817 100816 5559ed 100816->100806 100817->100816 100819 54a4d4 RtlEncodePointer 100818->100819 100819->100819 100820 54a4ee 100819->100820 100820->100696 100824 542c44 100821->100824 100823 542d4b 100823->100698 100825 542c50 __getstream 100824->100825 100832 543217 100825->100832 100831 542c77 __getstream 100831->100823 100833 549c0b __lock 58 API calls 100832->100833 100834 542c59 100833->100834 100835 542c88 RtlDecodePointer RtlDecodePointer 100834->100835 100836 542cb5 100835->100836 100837 542c65 100835->100837 100836->100837 100849 5487a4 59 API calls __Wcsftime_l 100836->100849 100846 542c82 100837->100846 100839 542d18 RtlEncodePointer RtlEncodePointer 100839->100837 100840 542cc7 100840->100839 100841 542cec 100840->100841 100850 548864 61 API calls __realloc_crt 100840->100850 100841->100837 100844 542d06 RtlEncodePointer 100841->100844 100851 548864 61 API calls __realloc_crt 100841->100851 100844->100839 100845 542d00 100845->100837 100845->100844 100852 543220 100846->100852 100849->100840 100850->100841 100851->100845 100855 549d75 RtlLeaveCriticalSection 100852->100855 100854 542c87 100854->100831 100855->100854 100857 549c0b __lock 58 API calls 100856->100857 100858 543377 RtlDecodePointer RtlEncodePointer 100857->100858 100921 549d75 RtlLeaveCriticalSection 100858->100921 100860 524849 100861 5433d4 100860->100861 100862 5433de 100861->100862 100863 5433f8 100861->100863 100862->100863 100922 548b28 58 API calls __getptd_noexit 100862->100922 100863->100705 100865 5433e8 100923 548db6 9 API calls __Wcsftime_l 100865->100923 100867 5433f3 100867->100705 100868->100707 100870 523b47 __ftell_nolock 100869->100870 100924 527667 100870->100924 100874 523b7a IsDebuggerPresent 100875 55d272 MessageBoxA 100874->100875 100876 523b88 100874->100876 100878 55d28c 100875->100878 100876->100878 100879 523ba5 100876->100879 100908 523c61 100876->100908 100877 523c68 SetCurrentDirectoryW 100884 523c75 Mailbox 100877->100884 101128 527213 59 API calls Mailbox 100878->101128 101010 527285 100879->101010 100883 523bc3 GetFullPathNameW 100886 527bcc 59 API calls 100883->100886 100884->100709 100885 55d29c 100888 55d2b2 SetCurrentDirectoryW 100885->100888 100887 523bfe 100886->100887 101026 53092d 100887->101026 100888->100884 100891 523c1c 100892 523c26 100891->100892 101129 57874b AllocateAndInitializeSid CheckTokenMembership FreeSid 100891->101129 101042 523a46 GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 100892->101042 100896 55d2cf 100896->100892 100899 55d2e0 100896->100899 100898 523c30 100901 523c43 100898->100901 101130 524706 100899->101130 100908->100877 100921->100860 100922->100865 100923->100867 100925 540db6 Mailbox 59 API calls 100924->100925 100926 527688 100925->100926 100927 540db6 Mailbox 59 API calls 100926->100927 100928 523b51 GetCurrentDirectoryW 100927->100928 100929 523766 100928->100929 100930 527667 59 API calls 100929->100930 100931 52377c 100930->100931 101141 523d31 100931->101141 100933 52379a 100934 524706 61 API calls 100933->100934 100935 5237ae 100934->100935 100936 527de1 59 API calls 100935->100936 100937 5237bb 100936->100937 101155 524ddd 100937->101155 100940 55d173 101222 58955b 100940->101222 100941 5237dc Mailbox 100945 528047 59 API calls 100941->100945 100944 55d192 100947 542d55 _free 58 API calls 100944->100947 100948 5237ef 100945->100948 100949 55d19f 100947->100949 101179 52928a 100948->101179 100951 524e4a 84 API calls 100949->100951 100953 55d1a8 100951->100953 100957 523ed0 59 API calls 100953->100957 100954 527de1 59 API calls 100955 523808 100954->100955 101182 5284c0 100955->101182 100959 55d1c3 100957->100959 100958 52381a Mailbox 100960 527de1 59 API calls 100958->100960 100961 523ed0 59 API calls 100959->100961 100962 523840 100960->100962 100963 55d1df 100961->100963 100964 5284c0 69 API calls 100962->100964 100965 524706 61 API calls 100963->100965 100967 52384f Mailbox 100964->100967 100966 55d204 100965->100966 100968 523ed0 59 API calls 100966->100968 100970 527667 59 API calls 100967->100970 100969 55d210 100968->100969 100971 528047 59 API calls 100969->100971 100972 52386d 100970->100972 100973 55d21e 100971->100973 101186 523ed0 100972->101186 100975 523ed0 59 API calls 100973->100975 100978 55d22d 100975->100978 100983 528047 59 API calls 100978->100983 100979 523887 100979->100953 100980 523891 100979->100980 100981 542efd _W_store_winword 60 API calls 100980->100981 100982 52389c 100981->100982 100982->100959 100984 5238a6 100982->100984 100985 55d24f 100983->100985 100986 542efd _W_store_winword 60 API calls 100984->100986 100987 523ed0 59 API calls 100985->100987 100988 5238b1 100986->100988 100989 55d25c 100987->100989 100988->100963 100990 5238bb 100988->100990 100989->100989 100991 542efd _W_store_winword 60 API calls 100990->100991 100992 5238c6 100991->100992 100992->100978 100993 523907 100992->100993 100995 523ed0 59 API calls 100992->100995 100993->100978 100994 523914 100993->100994 101202 5292ce 100994->101202 100997 5238ea 100995->100997 100999 528047 59 API calls 100997->100999 101000 5238f8 100999->101000 101002 523ed0 59 API calls 101000->101002 101002->100993 101005 52928a 59 API calls 101007 52394f 101005->101007 101006 528ee0 60 API calls 101006->101007 101007->101005 101007->101006 101008 523ed0 59 API calls 101007->101008 101009 523995 Mailbox 101007->101009 101008->101007 101009->100874 101011 527292 __ftell_nolock 101010->101011 101012 55ea22 _memset 101011->101012 101013 5272ab 101011->101013 101016 55ea3e 7523D0D0 101012->101016 102105 524750 101013->102105 101018 55ea8d 101016->101018 101019 527bcc 59 API calls 101018->101019 101021 55eaa2 101019->101021 101021->101021 101023 5272c9 102133 52686a 101023->102133 101027 53093a __ftell_nolock 101026->101027 102385 526d80 101027->102385 101029 53093f 101041 523c14 101029->101041 102396 53119e 101029->102396 101031 53094c 101031->101041 102404 533ee7 91 API calls Mailbox 101031->102404 101033 530955 101034 530959 GetFullPathNameW 101033->101034 101033->101041 101035 527bcc 59 API calls 101034->101035 101036 530985 101035->101036 101037 527bcc 59 API calls 101036->101037 101041->100885 101041->100891 101043 523ab0 LoadImageW RegisterClassExW 101042->101043 101044 55d261 101042->101044 102444 523041 GetSysColorBrush RegisterClassExW RegisterClipboardFormatW 101043->102444 102448 5247a0 LoadImageW EnumResourceNamesW 101044->102448 101048 55d26a 101049 5239d5 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 101049->100898 101128->100885 101129->100896 101131 551940 __ftell_nolock 101130->101131 101132 524713 GetModuleFileNameW 101131->101132 101133 527de1 59 API calls 101132->101133 101134 524739 101133->101134 101142 523d3e __ftell_nolock 101141->101142 101143 527bcc 59 API calls 101142->101143 101148 523ea4 Mailbox 101142->101148 101145 523d70 101143->101145 101153 523da6 Mailbox 101145->101153 101263 5279f2 101145->101263 101146 523e77 101147 527de1 59 API calls 101146->101147 101146->101148 101150 523e98 101147->101150 101148->100933 101149 527de1 59 API calls 101149->101153 101151 523f74 59 API calls 101150->101151 101151->101148 101153->101146 101153->101148 101153->101149 101154 5279f2 59 API calls 101153->101154 101266 523f74 101153->101266 101154->101153 101272 524bb5 101155->101272 101160 55d8e6 101163 524e4a 84 API calls 101160->101163 101161 524e08 LoadLibraryExW 101282 524b6a 101161->101282 101165 55d8ed 101163->101165 101167 524b6a 3 API calls 101165->101167 101169 55d8f5 101167->101169 101168 524e2f 101168->101169 101170 524e3b 101168->101170 101308 524f0b 101169->101308 101172 524e4a 84 API calls 101170->101172 101174 5237d4 101172->101174 101174->100940 101174->100941 101176 55d91c 101316 524ec7 101176->101316 101178 55d929 101180 540db6 Mailbox 59 API calls 101179->101180 101181 5237fb 101180->101181 101181->100954 101183 5284cb 101182->101183 101185 5284f2 101183->101185 101745 5289b3 69 API calls Mailbox 101183->101745 101185->100958 101187 523ef3 101186->101187 101188 523eda 101186->101188 101189 527bcc 59 API calls 101187->101189 101190 528047 59 API calls 101188->101190 101191 523879 101189->101191 101190->101191 101192 542efd 101191->101192 101193 542f7e 101192->101193 101194 542f09 101192->101194 101748 542f90 60 API calls 3 library calls 101193->101748 101196 542f2e 101194->101196 101746 548b28 58 API calls __getptd_noexit 101194->101746 101196->100979 101198 542f8b 101198->100979 101199 542f15 101747 548db6 9 API calls __Wcsftime_l 101199->101747 101201 542f20 101201->100979 101203 5292d6 101202->101203 101204 540db6 Mailbox 59 API calls 101203->101204 101205 5292e4 101204->101205 101206 523924 101205->101206 101749 5291fc 59 API calls Mailbox 101205->101749 101208 529050 101206->101208 101750 529160 101208->101750 101210 540db6 Mailbox 59 API calls 101212 523932 101210->101212 101211 52905f 101211->101210 101211->101212 101213 528ee0 101212->101213 101214 55f17c 101213->101214 101219 528ef7 101213->101219 101214->101219 101777 528bdb 59 API calls Mailbox 101214->101777 101216 529040 101764 529d3c 101216->101764 101217 528ff8 101220 540db6 Mailbox 59 API calls 101217->101220 101219->101216 101219->101217 101221 528fff 101219->101221 101220->101221 101221->101007 101223 524ee5 85 API calls 101222->101223 101224 5895ca 101223->101224 101780 589734 101224->101780 101227 524f0b 74 API calls 101228 5895f7 101227->101228 101229 524f0b 74 API calls 101228->101229 101230 589607 101229->101230 101231 524f0b 74 API calls 101230->101231 101232 589622 101231->101232 101233 524f0b 74 API calls 101232->101233 101234 58963d 101233->101234 101235 524ee5 85 API calls 101234->101235 101236 589654 101235->101236 101237 54571c __crtLCMapStringA_stat 58 API calls 101236->101237 101238 58965b 101237->101238 101239 54571c __crtLCMapStringA_stat 58 API calls 101238->101239 101240 589665 101239->101240 101241 524f0b 74 API calls 101240->101241 101242 589679 101241->101242 101243 589109 GetSystemTimeAsFileTime 101242->101243 101244 58968c 101243->101244 101245 5896a1 101244->101245 101246 5896b6 101244->101246 101247 542d55 _free 58 API calls 101245->101247 101248 58971b 101246->101248 101249 5896bc 101246->101249 101251 5896a7 101247->101251 101250 542d55 _free 58 API calls 101248->101250 101786 588b06 101249->101786 101256 55d186 101250->101256 101253 542d55 _free 58 API calls 101251->101253 101253->101256 101255 542d55 _free 58 API calls 101255->101256 101256->100944 101257 524e4a 101256->101257 101258 524e54 101257->101258 101259 524e5b 101257->101259 101260 5453a6 __fcloseall 83 API calls 101258->101260 101261 524e6a 101259->101261 101262 524e7b FreeLibrary 101259->101262 101260->101259 101261->100944 101262->101261 101264 527e4f 59 API calls 101263->101264 101265 5279fd 101264->101265 101265->101145 101267 523f82 101266->101267 101271 523fa4 _memmove 101266->101271 101269 540db6 Mailbox 59 API calls 101267->101269 101268 540db6 Mailbox 59 API calls 101270 523fb8 101268->101270 101269->101271 101270->101153 101271->101268 101321 524c03 101272->101321 101275 524bdc 101277 524bf5 101275->101277 101278 524bec FreeLibrary 101275->101278 101276 524c03 2 API calls 101276->101275 101279 54525b 101277->101279 101278->101277 101325 545270 101279->101325 101281 524dfc 101281->101160 101281->101161 101482 524c36 101282->101482 101285 524c36 2 API calls 101288 524b8f 101285->101288 101286 524ba1 FreeLibrary 101287 524baa 101286->101287 101289 524c70 101287->101289 101288->101286 101288->101287 101290 540db6 Mailbox 59 API calls 101289->101290 101291 524c85 101290->101291 101486 52522e 101291->101486 101293 524c91 _memmove 101294 524dc1 101293->101294 101295 524d89 101293->101295 101299 524ccc 101293->101299 101500 58991b 95 API calls 101294->101500 101489 524e89 CreateStreamOnHGlobal 101295->101489 101296 524ec7 69 API calls 101303 524cd5 101296->101303 101299->101296 101300 524f0b 74 API calls 101300->101303 101301 524d69 101301->101168 101303->101300 101303->101301 101304 55d8a7 101303->101304 101495 524ee5 101303->101495 101305 524ee5 85 API calls 101304->101305 101306 55d8bb 101305->101306 101307 524f0b 74 API calls 101306->101307 101307->101301 101309 55d9cd 101308->101309 101310 524f1d 101308->101310 101524 5455e2 101310->101524 101313 589109 101722 588f5f 101313->101722 101315 58911f 101315->101176 101317 524ed6 101316->101317 101318 55d990 101316->101318 101727 545c60 101317->101727 101320 524ede 101320->101178 101322 524bd0 101321->101322 101323 524c0c LoadLibraryA 101321->101323 101322->101275 101322->101276 101323->101322 101324 524c1d GetProcAddress 101323->101324 101324->101322 101326 54527c __getstream 101325->101326 101327 54528f 101326->101327 101330 5452c0 101326->101330 101374 548b28 58 API calls __getptd_noexit 101327->101374 101329 545294 101375 548db6 9 API calls __Wcsftime_l 101329->101375 101344 5504e8 101330->101344 101333 5452c5 101334 5452ce 101333->101334 101335 5452db 101333->101335 101376 548b28 58 API calls __getptd_noexit 101334->101376 101337 545305 101335->101337 101338 5452e5 101335->101338 101359 550607 101337->101359 101377 548b28 58 API calls __getptd_noexit 101338->101377 101341 54529f @_EH4_CallFilterFunc@8 __getstream 101341->101281 101345 5504f4 __getstream 101344->101345 101346 549c0b __lock 58 API calls 101345->101346 101353 550502 101346->101353 101347 550576 101379 5505fe 101347->101379 101348 55057d 101384 54881d 58 API calls 2 library calls 101348->101384 101351 550584 101351->101347 101385 549e2b InitializeCriticalSectionAndSpinCount 101351->101385 101352 5505f3 __getstream 101352->101333 101353->101347 101353->101348 101355 549c93 __mtinitlocknum 58 API calls 101353->101355 101382 546c50 59 API calls __lock 101353->101382 101383 546cba RtlLeaveCriticalSection RtlLeaveCriticalSection _doexit 101353->101383 101355->101353 101357 5505aa RtlEnterCriticalSection 101357->101347 101360 550627 __wopenfile 101359->101360 101361 550641 101360->101361 101373 5507fc 101360->101373 101392 5437cb 60 API calls 2 library calls 101360->101392 101390 548b28 58 API calls __getptd_noexit 101361->101390 101363 550646 101391 548db6 9 API calls __Wcsftime_l 101363->101391 101365 55085f 101387 5585a1 101365->101387 101366 545310 101378 545332 RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 101366->101378 101369 5507f5 101369->101373 101393 5437cb 60 API calls 2 library calls 101369->101393 101371 550814 101371->101373 101394 5437cb 60 API calls 2 library calls 101371->101394 101373->101361 101373->101365 101374->101329 101375->101341 101376->101341 101377->101341 101378->101341 101386 549d75 RtlLeaveCriticalSection 101379->101386 101381 550605 101381->101352 101382->101353 101383->101353 101384->101351 101385->101357 101386->101381 101395 557d85 101387->101395 101389 5585ba 101389->101366 101390->101363 101391->101366 101392->101369 101393->101371 101394->101373 101398 557d91 __getstream 101395->101398 101396 557da7 101479 548b28 58 API calls __getptd_noexit 101396->101479 101398->101396 101400 557ddd 101398->101400 101399 557dac 101480 548db6 9 API calls __Wcsftime_l 101399->101480 101406 557e4e 101400->101406 101403 557df9 101481 557e22 RtlLeaveCriticalSection __unlock_fhandle 101403->101481 101404 557db6 __getstream 101404->101389 101407 557e6e 101406->101407 101408 5444ea __wsopen_nolock 58 API calls 101407->101408 101411 557e8a 101408->101411 101409 548dc6 __invoke_watson 8 API calls 101410 5585a0 101409->101410 101413 557d85 __wsopen_helper 103 API calls 101410->101413 101412 557ec4 101411->101412 101420 557ee7 101411->101420 101478 557fc1 101411->101478 101415 548af4 __read_nolock 58 API calls 101412->101415 101414 5585ba 101413->101414 101414->101403 101416 557ec9 101415->101416 101417 548b28 __Wcsftime_l 58 API calls 101416->101417 101418 557ed6 101417->101418 101421 548db6 __Wcsftime_l 9 API calls 101418->101421 101419 557fa5 101422 548af4 __read_nolock 58 API calls 101419->101422 101420->101419 101427 557f83 101420->101427 101423 557ee0 101421->101423 101424 557faa 101422->101424 101423->101403 101425 548b28 __Wcsftime_l 58 API calls 101424->101425 101426 557fb7 101425->101426 101428 548db6 __Wcsftime_l 9 API calls 101426->101428 101429 54d294 __alloc_osfhnd 61 API calls 101427->101429 101428->101478 101430 558051 101429->101430 101431 55807e 101430->101431 101432 55805b 101430->101432 101434 557cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101431->101434 101433 548af4 __read_nolock 58 API calls 101432->101433 101435 558060 101433->101435 101445 5580a0 101434->101445 101436 548b28 __Wcsftime_l 58 API calls 101435->101436 101438 55806a 101436->101438 101437 55811e GetFileType 101439 558129 GetLastError 101437->101439 101440 55816b 101437->101440 101443 548b28 __Wcsftime_l 58 API calls 101438->101443 101444 548b07 __dosmaperr 58 API calls 101439->101444 101449 54d52a __set_osfhnd 59 API calls 101440->101449 101441 5580ec GetLastError 101442 548b07 __dosmaperr 58 API calls 101441->101442 101446 558111 101442->101446 101443->101423 101447 558150 CloseHandle 101444->101447 101445->101437 101445->101441 101448 557cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101445->101448 101452 548b28 __Wcsftime_l 58 API calls 101446->101452 101447->101446 101450 55815e 101447->101450 101451 5580e1 101448->101451 101455 558189 101449->101455 101453 548b28 __Wcsftime_l 58 API calls 101450->101453 101451->101437 101451->101441 101452->101478 101454 558163 101453->101454 101454->101446 101456 558344 101455->101456 101457 5518c1 __lseeki64_nolock 60 API calls 101455->101457 101475 55820a 101455->101475 101458 558517 CloseHandle 101456->101458 101456->101478 101460 5581f3 101457->101460 101459 557cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101458->101459 101461 55853e 101459->101461 101462 548af4 __read_nolock 58 API calls 101460->101462 101460->101475 101463 558546 GetLastError 101461->101463 101464 558572 101461->101464 101462->101475 101465 548b07 __dosmaperr 58 API calls 101463->101465 101464->101478 101466 558552 101465->101466 101470 54d43d __free_osfhnd 59 API calls 101466->101470 101467 550add __close_nolock 61 API calls 101467->101475 101468 550e5b 70 API calls __read_nolock 101468->101475 101469 5597a2 __chsize_nolock 82 API calls 101469->101475 101470->101464 101471 54d886 __write 78 API calls 101471->101475 101472 5583c1 101474 550add __close_nolock 61 API calls 101472->101474 101473 5518c1 60 API calls __lseeki64_nolock 101473->101475 101476 5583c8 101474->101476 101475->101456 101475->101467 101475->101468 101475->101469 101475->101471 101475->101472 101475->101473 101477 548b28 __Wcsftime_l 58 API calls 101476->101477 101477->101478 101478->101409 101479->101399 101480->101404 101481->101404 101483 524b83 101482->101483 101484 524c3f LoadLibraryA 101482->101484 101483->101285 101483->101288 101484->101483 101485 524c50 GetProcAddress 101484->101485 101485->101483 101487 540db6 Mailbox 59 API calls 101486->101487 101488 525240 101487->101488 101488->101293 101490 524ea3 FindResourceExW 101489->101490 101494 524ec0 101489->101494 101491 55d933 LoadResource 101490->101491 101490->101494 101492 55d948 SizeofResource 101491->101492 101491->101494 101493 55d95c LockResource 101492->101493 101492->101494 101493->101494 101494->101299 101496 524ef4 101495->101496 101497 55d9ab 101495->101497 101501 54584d 101496->101501 101499 524f02 101499->101303 101500->101299 101502 545859 __getstream 101501->101502 101503 54586b 101502->101503 101504 545891 101502->101504 101514 548b28 58 API calls __getptd_noexit 101503->101514 101516 546c11 101504->101516 101506 545870 101515 548db6 9 API calls __Wcsftime_l 101506->101515 101509 545897 101522 5457be 83 API calls 5 library calls 101509->101522 101511 5458a6 101523 5458c8 RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 101511->101523 101513 54587b __getstream 101513->101499 101514->101506 101515->101513 101517 546c21 101516->101517 101518 546c43 RtlEnterCriticalSection 101516->101518 101517->101518 101520 546c29 101517->101520 101519 546c39 101518->101519 101519->101509 101521 549c0b __lock 58 API calls 101520->101521 101521->101519 101522->101511 101523->101513 101527 5455fd 101524->101527 101526 524f2e 101526->101313 101528 545609 __getstream 101527->101528 101529 54564c 101528->101529 101530 54561f _memset 101528->101530 101531 545644 __getstream 101528->101531 101532 546c11 __lock_file 59 API calls 101529->101532 101554 548b28 58 API calls __getptd_noexit 101530->101554 101531->101526 101534 545652 101532->101534 101540 54541d 101534->101540 101536 545639 101555 548db6 9 API calls __Wcsftime_l 101536->101555 101543 545438 _memset 101540->101543 101545 545453 101540->101545 101541 545443 101652 548b28 58 API calls __getptd_noexit 101541->101652 101543->101541 101543->101545 101548 545493 101543->101548 101556 545686 RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 101545->101556 101547 5455a4 _memset 101655 548b28 58 API calls __getptd_noexit 101547->101655 101548->101545 101548->101547 101557 5446e6 101548->101557 101564 550e5b 101548->101564 101632 550ba7 101548->101632 101654 550cc8 58 API calls 3 library calls 101548->101654 101553 545448 101653 548db6 9 API calls __Wcsftime_l 101553->101653 101554->101536 101555->101531 101556->101531 101558 544705 101557->101558 101559 5446f0 101557->101559 101558->101548 101656 548b28 58 API calls __getptd_noexit 101559->101656 101561 5446f5 101657 548db6 9 API calls __Wcsftime_l 101561->101657 101563 544700 101563->101548 101565 550e93 101564->101565 101566 550e7c 101564->101566 101567 5515cb 101565->101567 101571 550ecd 101565->101571 101667 548af4 58 API calls __getptd_noexit 101566->101667 101683 548af4 58 API calls __getptd_noexit 101567->101683 101570 550e81 101668 548b28 58 API calls __getptd_noexit 101570->101668 101574 550ed5 101571->101574 101581 550eec 101571->101581 101572 5515d0 101684 548b28 58 API calls __getptd_noexit 101572->101684 101669 548af4 58 API calls __getptd_noexit 101574->101669 101577 550ee1 101685 548db6 9 API calls __Wcsftime_l 101577->101685 101578 550eda 101670 548b28 58 API calls __getptd_noexit 101578->101670 101580 550f01 101671 548af4 58 API calls __getptd_noexit 101580->101671 101581->101580 101582 550f1b 101581->101582 101585 550f39 101581->101585 101612 550e88 101581->101612 101582->101580 101587 550f26 101582->101587 101672 54881d 58 API calls 2 library calls 101585->101672 101658 555c6b 101587->101658 101588 550f49 101590 550f51 101588->101590 101591 550f6c 101588->101591 101673 548b28 58 API calls __getptd_noexit 101590->101673 101675 5518c1 60 API calls 3 library calls 101591->101675 101592 55103a 101593 5510b3 ReadFile 101592->101593 101596 551050 GetConsoleMode 101592->101596 101597 5510d5 101593->101597 101598 551593 GetLastError 101593->101598 101600 551064 101596->101600 101601 5510b0 101596->101601 101597->101598 101606 5510a5 101597->101606 101602 551093 101598->101602 101603 5515a0 101598->101603 101599 550f56 101674 548af4 58 API calls __getptd_noexit 101599->101674 101600->101601 101605 55106a ReadConsoleW 101600->101605 101601->101593 101614 551099 101602->101614 101676 548b07 58 API calls 3 library calls 101602->101676 101681 548b28 58 API calls __getptd_noexit 101603->101681 101605->101606 101609 55108d GetLastError 101605->101609 101606->101614 101615 55110a 101606->101615 101618 551377 101606->101618 101608 5515a5 101682 548af4 58 API calls __getptd_noexit 101608->101682 101609->101602 101612->101548 101613 542d55 _free 58 API calls 101613->101612 101614->101612 101614->101613 101617 551176 ReadFile 101615->101617 101625 5511f7 101615->101625 101620 551197 GetLastError 101617->101620 101630 5511a1 101617->101630 101618->101614 101619 55147d ReadFile 101618->101619 101624 5514a0 GetLastError 101619->101624 101631 5514ae 101619->101631 101620->101630 101621 5512b4 101626 551264 MultiByteToWideChar 101621->101626 101679 5518c1 60 API calls 3 library calls 101621->101679 101622 5512a4 101678 548b28 58 API calls __getptd_noexit 101622->101678 101624->101631 101625->101614 101625->101621 101625->101622 101625->101626 101626->101609 101626->101614 101630->101615 101677 5518c1 60 API calls 3 library calls 101630->101677 101631->101618 101680 5518c1 60 API calls 3 library calls 101631->101680 101633 550bb2 101632->101633 101637 550bc7 101632->101637 101719 548b28 58 API calls __getptd_noexit 101633->101719 101635 550bb7 101720 548db6 9 API calls __Wcsftime_l 101635->101720 101638 550bfc 101637->101638 101643 550bc2 101637->101643 101721 555fe4 58 API calls __malloc_crt 101637->101721 101640 5446e6 __filbuf 58 API calls 101638->101640 101641 550c10 101640->101641 101686 550d47 101641->101686 101643->101548 101644 550c17 101644->101643 101645 5446e6 __filbuf 58 API calls 101644->101645 101646 550c3a 101645->101646 101646->101643 101647 5446e6 __filbuf 58 API calls 101646->101647 101648 550c46 101647->101648 101648->101643 101649 5446e6 __filbuf 58 API calls 101648->101649 101650 550c53 101649->101650 101651 5446e6 __filbuf 58 API calls 101650->101651 101651->101643 101652->101553 101653->101545 101654->101548 101655->101553 101656->101561 101657->101563 101659 555c76 101658->101659 101660 555c83 101658->101660 101661 548b28 __Wcsftime_l 58 API calls 101659->101661 101663 555c8f 101660->101663 101664 548b28 __Wcsftime_l 58 API calls 101660->101664 101662 555c7b 101661->101662 101662->101592 101663->101592 101665 555cb0 101664->101665 101666 548db6 __Wcsftime_l 9 API calls 101665->101666 101666->101662 101667->101570 101668->101612 101669->101578 101670->101577 101671->101578 101672->101588 101673->101599 101674->101612 101675->101587 101676->101614 101677->101630 101678->101614 101679->101626 101680->101631 101681->101608 101682->101614 101683->101572 101684->101577 101685->101612 101687 550d53 __getstream 101686->101687 101688 550d77 101687->101688 101689 550d60 101687->101689 101691 550e3b 101688->101691 101694 550d8b 101688->101694 101690 548af4 __read_nolock 58 API calls 101689->101690 101693 550d65 101690->101693 101692 548af4 __read_nolock 58 API calls 101691->101692 101695 550dae 101692->101695 101696 548b28 __Wcsftime_l 58 API calls 101693->101696 101697 550db6 101694->101697 101698 550da9 101694->101698 101704 548b28 __Wcsftime_l 58 API calls 101695->101704 101711 550d6c __getstream 101696->101711 101699 550dc3 101697->101699 101700 550dd8 101697->101700 101701 548af4 __read_nolock 58 API calls 101698->101701 101702 548af4 __read_nolock 58 API calls 101699->101702 101703 54d206 ___lock_fhandle 59 API calls 101700->101703 101701->101695 101705 550dc8 101702->101705 101706 550dde 101703->101706 101707 550dd0 101704->101707 101708 548b28 __Wcsftime_l 58 API calls 101705->101708 101709 550e04 101706->101709 101710 550df1 101706->101710 101713 548db6 __Wcsftime_l 9 API calls 101707->101713 101708->101707 101714 548b28 __Wcsftime_l 58 API calls 101709->101714 101712 550e5b __read_nolock 70 API calls 101710->101712 101711->101644 101715 550dfd 101712->101715 101713->101711 101716 550e09 101714->101716 101718 550e33 __read RtlLeaveCriticalSection 101715->101718 101717 548af4 __read_nolock 58 API calls 101716->101717 101717->101715 101718->101711 101719->101635 101720->101643 101721->101638 101725 54520a GetSystemTimeAsFileTime 101722->101725 101724 588f6e 101724->101315 101726 545238 __aulldiv 101725->101726 101726->101724 101728 545c6c __getstream 101727->101728 101729 545c93 101728->101729 101730 545c7e 101728->101730 101731 546c11 __lock_file 59 API calls 101729->101731 101741 548b28 58 API calls __getptd_noexit 101730->101741 101733 545c99 101731->101733 101743 5458d0 67 API calls 6 library calls 101733->101743 101734 545c83 101742 548db6 9 API calls __Wcsftime_l 101734->101742 101737 545ca4 101744 545cc4 RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 101737->101744 101739 545cb6 101740 545c8e __getstream 101739->101740 101740->101320 101741->101734 101742->101740 101743->101737 101744->101739 101745->101185 101746->101199 101747->101201 101748->101198 101749->101206 101751 529169 Mailbox 101750->101751 101752 55f19f 101751->101752 101757 529173 101751->101757 101753 540db6 Mailbox 59 API calls 101752->101753 101754 55f1ab 101753->101754 101754->101754 101755 52917a 101755->101211 101757->101755 101758 529c90 101757->101758 101759 529c9b 101758->101759 101760 529cd2 101759->101760 101763 528cd4 59 API calls Mailbox 101759->101763 101760->101757 101762 529cfd 101762->101757 101763->101762 101765 529d4a 101764->101765 101775 529d78 Mailbox 101764->101775 101766 529d9d 101765->101766 101769 529d50 Mailbox 101765->101769 101768 528047 59 API calls 101766->101768 101767 529d64 101770 529d6f 101767->101770 101771 529dcc 101767->101771 101767->101775 101768->101775 101769->101767 101772 55fa0f 101769->101772 101774 55f9e6 VariantClear 101770->101774 101770->101775 101771->101775 101778 528cd4 59 API calls Mailbox 101771->101778 101772->101775 101779 576e8f 59 API calls 101772->101779 101774->101775 101775->101221 101777->101219 101778->101775 101779->101775 101785 589748 _wcscmp _W_expandtime 101780->101785 101781 5895dc 101781->101227 101781->101256 101782 589109 GetSystemTimeAsFileTime 101782->101785 101783 524f0b 74 API calls 101783->101785 101784 524ee5 85 API calls 101784->101785 101785->101781 101785->101782 101785->101783 101785->101784 101787 588b1f 101786->101787 101788 588b11 101786->101788 101790 588b64 101787->101790 101791 54525b 115 API calls 101787->101791 101803 588b28 101787->101803 101789 54525b 115 API calls 101788->101789 101789->101787 101817 588d91 101790->101817 101793 588b49 101791->101793 101793->101790 101795 588b52 101793->101795 101794 588ba8 101796 588bac 101794->101796 101797 588bcd 101794->101797 101799 5453a6 __fcloseall 83 API calls 101795->101799 101795->101803 101798 588bb9 101796->101798 101802 5453a6 __fcloseall 83 API calls 101796->101802 101821 5889a9 101797->101821 101798->101803 101806 5453a6 __fcloseall 83 API calls 101798->101806 101799->101803 101802->101798 101803->101255 101804 588bfb 101830 588c2b 101804->101830 101805 588bdb 101807 588be8 101805->101807 101809 5453a6 __fcloseall 83 API calls 101805->101809 101806->101803 101807->101803 101811 5453a6 __fcloseall 83 API calls 101807->101811 101809->101807 101811->101803 101815 588c16 101815->101803 101816 5453a6 __fcloseall 83 API calls 101815->101816 101816->101803 101818 588db6 101817->101818 101820 588d9f _memmove _W_expandtime 101817->101820 101819 5455e2 __fread_nolock 74 API calls 101818->101819 101819->101820 101820->101794 101822 54571c __crtLCMapStringA_stat 58 API calls 101821->101822 101823 5889b8 101822->101823 101824 54571c __crtLCMapStringA_stat 58 API calls 101823->101824 101825 5889cc 101824->101825 101826 54571c __crtLCMapStringA_stat 58 API calls 101825->101826 101827 5889e0 101826->101827 101828 588d0d 58 API calls 101827->101828 101829 5889f3 101827->101829 101828->101829 101829->101804 101829->101805 101832 588c40 101830->101832 101831 588cf8 101863 588f35 101831->101863 101832->101831 101834 588c02 101832->101834 101835 588a05 74 API calls 101832->101835 101859 588e12 101832->101859 101867 588aa1 74 API calls 101832->101867 101838 588d0d 101834->101838 101835->101832 101839 588d1a 101838->101839 101840 588d20 101838->101840 101841 542d55 _free 58 API calls 101839->101841 101842 588d31 101840->101842 101844 542d55 _free 58 API calls 101840->101844 101841->101840 101843 588c09 101842->101843 101845 542d55 _free 58 API calls 101842->101845 101843->101815 101846 5453a6 101843->101846 101844->101842 101845->101843 101847 5453b2 __getstream 101846->101847 101848 5453c6 101847->101848 101849 5453de 101847->101849 101916 548b28 58 API calls __getptd_noexit 101848->101916 101852 546c11 __lock_file 59 API calls 101849->101852 101855 5453d6 __getstream 101849->101855 101851 5453cb 101917 548db6 9 API calls __Wcsftime_l 101851->101917 101854 5453f0 101852->101854 101900 54533a 101854->101900 101855->101815 101860 588e61 101859->101860 101861 588e21 101859->101861 101860->101861 101868 588ee8 101860->101868 101861->101832 101864 588f53 101863->101864 101865 588f42 101863->101865 101864->101834 101866 544863 80 API calls 101865->101866 101866->101864 101867->101832 101869 588f25 101868->101869 101870 588f14 101868->101870 101869->101860 101872 544863 101870->101872 101873 54486f __getstream 101872->101873 101874 54489d __getstream 101873->101874 101875 5448a5 101873->101875 101876 54488d 101873->101876 101874->101869 101877 546c11 __lock_file 59 API calls 101875->101877 101897 548b28 58 API calls __getptd_noexit 101876->101897 101879 5448ab 101877->101879 101885 54470a 101879->101885 101880 544892 101898 548db6 9 API calls __Wcsftime_l 101880->101898 101888 544719 101885->101888 101891 544737 101885->101891 101886 544727 101887 548b28 __Wcsftime_l 58 API calls 101886->101887 101889 54472c 101887->101889 101888->101886 101888->101891 101895 544751 _memmove 101888->101895 101890 548db6 __Wcsftime_l 9 API calls 101889->101890 101890->101891 101899 5448dd RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 101891->101899 101892 54ae1e __flsbuf 78 API calls 101892->101895 101893 544a3d __flush 78 API calls 101893->101895 101894 5446e6 __filbuf 58 API calls 101894->101895 101895->101891 101895->101892 101895->101893 101895->101894 101896 54d886 __write 78 API calls 101895->101896 101896->101895 101897->101880 101898->101874 101899->101874 101901 54535d 101900->101901 101902 545349 101900->101902 101908 545359 101901->101908 101919 544a3d 101901->101919 101955 548b28 58 API calls __getptd_noexit 101902->101955 101904 54534e 101956 548db6 9 API calls __Wcsftime_l 101904->101956 101918 545415 RtlLeaveCriticalSection RtlLeaveCriticalSection _fprintf 101908->101918 101911 5446e6 __filbuf 58 API calls 101912 545377 101911->101912 101929 550a02 101912->101929 101914 54537d 101914->101908 101915 542d55 _free 58 API calls 101914->101915 101915->101908 101916->101851 101917->101855 101918->101855 101920 544a50 101919->101920 101921 544a74 101919->101921 101920->101921 101922 5446e6 __filbuf 58 API calls 101920->101922 101925 550b77 101921->101925 101923 544a6d 101922->101923 101957 54d886 101923->101957 101926 545371 101925->101926 101927 550b84 101925->101927 101926->101911 101927->101926 101928 542d55 _free 58 API calls 101927->101928 101928->101926 101930 550a0e __getstream 101929->101930 101931 550a32 101930->101931 101932 550a1b 101930->101932 101933 550abd 101931->101933 101936 550a42 101931->101936 102082 548af4 58 API calls __getptd_noexit 101932->102082 102087 548af4 58 API calls __getptd_noexit 101933->102087 101935 550a20 102083 548b28 58 API calls __getptd_noexit 101935->102083 101939 550a60 101936->101939 101940 550a6a 101936->101940 102084 548af4 58 API calls __getptd_noexit 101939->102084 101943 54d206 ___lock_fhandle 59 API calls 101940->101943 101941 550a65 102088 548b28 58 API calls __getptd_noexit 101941->102088 101945 550a70 101943->101945 101947 550a83 101945->101947 101948 550a8e 101945->101948 101946 550ac9 102089 548db6 9 API calls __Wcsftime_l 101946->102089 102067 550add 101947->102067 102085 548b28 58 API calls __getptd_noexit 101948->102085 101952 550a27 __getstream 101952->101914 101953 550a89 102086 550ab5 RtlLeaveCriticalSection __unlock_fhandle 101953->102086 101955->101904 101956->101908 101958 54d892 __getstream 101957->101958 101959 54d8b6 101958->101959 101960 54d89f 101958->101960 101961 54d955 101959->101961 101963 54d8ca 101959->101963 102058 548af4 58 API calls __getptd_noexit 101960->102058 102064 548af4 58 API calls __getptd_noexit 101961->102064 101966 54d8f2 101963->101966 101967 54d8e8 101963->101967 101965 54d8a4 102059 548b28 58 API calls __getptd_noexit 101965->102059 101985 54d206 101966->101985 102060 548af4 58 API calls __getptd_noexit 101967->102060 101968 54d8ed 102065 548b28 58 API calls __getptd_noexit 101968->102065 101970 54d8ab __getstream 101970->101921 101973 54d8f8 101975 54d91e 101973->101975 101976 54d90b 101973->101976 102061 548b28 58 API calls __getptd_noexit 101975->102061 101994 54d975 101976->101994 101977 54d961 102066 548db6 9 API calls __Wcsftime_l 101977->102066 101981 54d923 102062 548af4 58 API calls __getptd_noexit 101981->102062 101983 54d917 102063 54d94d RtlLeaveCriticalSection __unlock_fhandle 101983->102063 101986 54d212 __getstream 101985->101986 101987 54d261 RtlEnterCriticalSection 101986->101987 101989 549c0b __lock 58 API calls 101986->101989 101988 54d287 __getstream 101987->101988 101988->101973 101990 54d237 101989->101990 101991 54d24f 101990->101991 101992 549e2b __getstream InitializeCriticalSectionAndSpinCount 101990->101992 101993 54d28b ___lock_fhandle RtlLeaveCriticalSection 101991->101993 101992->101991 101993->101987 101995 54d982 __ftell_nolock 101994->101995 101996 54d9e0 101995->101996 101997 54d9c1 101995->101997 102025 54d9b6 101995->102025 102001 54da38 101996->102001 102002 54da1c 101996->102002 101998 548af4 __read_nolock 58 API calls 101997->101998 102000 54d9c6 101998->102000 101999 54c5f6 __ld12tod 6 API calls 102003 54e1d6 101999->102003 102004 548b28 __Wcsftime_l 58 API calls 102000->102004 102005 54da51 102001->102005 102008 5518c1 __lseeki64_nolock 60 API calls 102001->102008 102006 548af4 __read_nolock 58 API calls 102002->102006 102003->101983 102007 54d9cd 102004->102007 102009 555c6b __read_nolock 58 API calls 102005->102009 102010 54da21 102006->102010 102011 548db6 __Wcsftime_l 9 API calls 102007->102011 102008->102005 102012 54da5f 102009->102012 102013 548b28 __Wcsftime_l 58 API calls 102010->102013 102011->102025 102014 54ddb8 102012->102014 102019 5499ac _wcstok 58 API calls 102012->102019 102015 54da28 102013->102015 102016 54ddd6 102014->102016 102017 54e14b WriteFile 102014->102017 102018 548db6 __Wcsftime_l 9 API calls 102015->102018 102020 54defa 102016->102020 102027 54ddec 102016->102027 102021 54ddab GetLastError 102017->102021 102024 54dd78 102017->102024 102018->102025 102022 54da8b GetConsoleMode 102019->102022 102035 54dfef 102020->102035 102037 54df05 102020->102037 102021->102024 102022->102014 102026 54daca 102022->102026 102023 54e184 102023->102025 102029 548b28 __Wcsftime_l 58 API calls 102023->102029 102024->102023 102024->102025 102033 54ded8 102024->102033 102025->101999 102026->102014 102030 54dada GetConsoleCP 102026->102030 102027->102023 102028 54de5b WriteFile 102027->102028 102028->102021 102031 54de98 102028->102031 102032 54e1b2 102029->102032 102030->102023 102052 54db09 102030->102052 102031->102027 102036 54debc 102031->102036 102039 548af4 __read_nolock 58 API calls 102032->102039 102040 54dee3 102033->102040 102041 54e17b 102033->102041 102034 54e064 WideCharToMultiByte 102034->102021 102050 54e0ab 102034->102050 102035->102023 102035->102034 102036->102024 102037->102023 102038 54df6a WriteFile 102037->102038 102038->102021 102042 54dfb9 102038->102042 102039->102025 102043 548b28 __Wcsftime_l 58 API calls 102040->102043 102044 548b07 __dosmaperr 58 API calls 102041->102044 102042->102024 102042->102036 102042->102037 102046 54dee8 102043->102046 102044->102025 102045 54e0b3 WriteFile 102048 54e106 GetLastError 102045->102048 102045->102050 102049 548af4 __read_nolock 58 API calls 102046->102049 102047 5435f5 __write_nolock 58 API calls 102047->102052 102048->102050 102049->102025 102050->102024 102050->102035 102050->102036 102050->102045 102051 5562ba 60 API calls __write_nolock 102051->102052 102052->102024 102052->102047 102052->102051 102053 54dbf2 WideCharToMultiByte 102052->102053 102056 54dc5f 102052->102056 102053->102024 102054 54dc2d WriteFile 102053->102054 102054->102021 102054->102056 102055 557a5e WriteConsoleW CreateFileW __putwch_nolock 102055->102056 102056->102021 102056->102024 102056->102052 102056->102055 102057 54dc87 WriteFile 102056->102057 102057->102021 102057->102056 102058->101965 102059->101970 102060->101968 102061->101981 102062->101983 102063->101970 102064->101968 102065->101977 102066->101970 102090 54d4c3 102067->102090 102069 550aeb 102070 550b41 102069->102070 102071 550b1f 102069->102071 102074 54d4c3 __chsize_nolock 58 API calls 102069->102074 102103 54d43d 59 API calls 2 library calls 102070->102103 102071->102070 102075 54d4c3 __chsize_nolock 58 API calls 102071->102075 102073 550b49 102076 550b6b 102073->102076 102104 548b07 58 API calls 3 library calls 102073->102104 102077 550b16 102074->102077 102078 550b2b CloseHandle 102075->102078 102076->101953 102080 54d4c3 __chsize_nolock 58 API calls 102077->102080 102078->102070 102081 550b37 GetLastError 102078->102081 102080->102071 102081->102070 102082->101935 102083->101952 102084->101941 102085->101953 102086->101952 102087->101941 102088->101946 102089->101952 102091 54d4e3 102090->102091 102092 54d4ce 102090->102092 102094 548af4 __read_nolock 58 API calls 102091->102094 102096 54d508 102091->102096 102093 548af4 __read_nolock 58 API calls 102092->102093 102095 54d4d3 102093->102095 102097 54d512 102094->102097 102098 548b28 __Wcsftime_l 58 API calls 102095->102098 102096->102069 102100 548b28 __Wcsftime_l 58 API calls 102097->102100 102099 54d4db 102098->102099 102099->102069 102101 54d51a 102100->102101 102102 548db6 __Wcsftime_l 9 API calls 102101->102102 102102->102099 102103->102073 102104->102076 102167 551940 102105->102167 102108 524799 102173 527d8c 102108->102173 102109 52477c 102110 527bcc 59 API calls 102109->102110 102112 524788 102110->102112 102169 527726 102112->102169 102115 540791 102116 551940 __ftell_nolock 102115->102116 102117 54079e GetLongPathNameW 102116->102117 102118 527bcc 59 API calls 102117->102118 102119 5272bd 102118->102119 102120 52700b 102119->102120 102121 527667 59 API calls 102120->102121 102122 52701d 102121->102122 102123 524750 60 API calls 102122->102123 102124 527028 102123->102124 102125 55e885 102124->102125 102126 527033 102124->102126 102131 55e89f 102125->102131 102183 527908 61 API calls 102125->102183 102128 523f74 59 API calls 102126->102128 102129 52703f 102128->102129 102177 5234c2 102129->102177 102132 527052 Mailbox 102132->101023 102134 524ddd 136 API calls 102133->102134 102135 52688f 102134->102135 102136 55e031 102135->102136 102137 524ddd 136 API calls 102135->102137 102138 58955b 122 API calls 102136->102138 102139 5268a3 102137->102139 102140 55e046 102138->102140 102139->102136 102141 5268ab 102139->102141 102142 55e067 102140->102142 102143 55e04a 102140->102143 102145 5268b7 102141->102145 102146 55e052 102141->102146 102144 540db6 Mailbox 59 API calls 102142->102144 102147 524e4a 84 API calls 102143->102147 102166 55e0ac Mailbox 102144->102166 102184 526a8c 102145->102184 102277 5842f8 90 API calls _wprintf 102146->102277 102147->102146 102151 55e060 102151->102142 102152 55e260 102153 542d55 _free 58 API calls 102152->102153 102154 55e268 102153->102154 102155 524e4a 84 API calls 102154->102155 102160 55e271 102155->102160 102159 542d55 _free 58 API calls 102159->102160 102160->102159 102161 524e4a 84 API calls 102160->102161 102283 57f7a1 89 API calls 4 library calls 102160->102283 102161->102160 102163 527de1 59 API calls 102163->102166 102166->102152 102166->102160 102166->102163 102278 57f73d 59 API calls 2 library calls 102166->102278 102279 57f65e 61 API calls 2 library calls 102166->102279 102280 58737f 59 API calls Mailbox 102166->102280 102281 52750f 59 API calls 2 library calls 102166->102281 102282 52735d 59 API calls Mailbox 102166->102282 102168 52475d GetFullPathNameW 102167->102168 102168->102108 102168->102109 102170 527734 102169->102170 102171 527d2c 59 API calls 102170->102171 102172 524794 102171->102172 102172->102115 102174 527da6 102173->102174 102175 527d99 102173->102175 102176 540db6 Mailbox 59 API calls 102174->102176 102175->102112 102176->102175 102178 5234d4 102177->102178 102182 5234f3 _memmove 102177->102182 102180 540db6 Mailbox 59 API calls 102178->102180 102179 540db6 Mailbox 59 API calls 102181 52350a 102179->102181 102180->102182 102181->102132 102182->102179 102183->102125 102185 526ab5 102184->102185 102186 55e41e 102184->102186 102289 5257a6 60 API calls Mailbox 102185->102289 102356 57f7a1 89 API calls 4 library calls 102186->102356 102189 526ad7 102290 5257f6 67 API calls 102189->102290 102190 55e431 102357 57f7a1 89 API calls 4 library calls 102190->102357 102192 526aec 102192->102190 102193 526af4 102192->102193 102195 527667 59 API calls 102193->102195 102197 526b00 102195->102197 102196 55e44d 102199 526b61 102196->102199 102291 540957 60 API calls __ftell_nolock 102197->102291 102201 55e460 102199->102201 102202 526b6f 102199->102202 102200 526b0c 102205 527667 59 API calls 102200->102205 102203 525c6f CloseHandle 102201->102203 102204 527667 59 API calls 102202->102204 102206 55e46c 102203->102206 102207 526b78 102204->102207 102208 526b18 102205->102208 102209 524ddd 136 API calls 102206->102209 102210 527667 59 API calls 102207->102210 102211 524750 60 API calls 102208->102211 102212 55e488 102209->102212 102213 526b81 102210->102213 102214 526b26 102211->102214 102215 55e4b1 102212->102215 102218 58955b 122 API calls 102212->102218 102294 52459b 102213->102294 102292 525850 ReadFile SetFilePointerEx 102214->102292 102358 57f7a1 89 API calls 4 library calls 102215->102358 102223 55e4a4 102218->102223 102219 526b98 102224 527b2e 59 API calls 102219->102224 102221 526b52 102293 525aee SetFilePointerEx SetFilePointerEx 102221->102293 102226 55e4cd 102223->102226 102227 55e4ac 102223->102227 102228 526ba9 SetCurrentDirectoryW 102224->102228 102225 55e4c8 102256 526d0c Mailbox 102225->102256 102230 524e4a 84 API calls 102226->102230 102229 524e4a 84 API calls 102227->102229 102233 526bbc Mailbox 102228->102233 102229->102215 102231 55e4d2 102230->102231 102232 540db6 Mailbox 59 API calls 102231->102232 102239 55e506 102232->102239 102237 523bbb 102237->100883 102237->100908 102359 52750f 59 API calls 2 library calls 102239->102359 102244 55e740 102365 5872df 59 API calls Mailbox 102244->102365 102248 55e762 102366 59fbce 59 API calls 2 library calls 102248->102366 102251 55e76f 102253 542d55 _free 58 API calls 102251->102253 102253->102256 102284 5257d4 102256->102284 102259 55e54f Mailbox 102259->102244 102268 527de1 59 API calls 102259->102268 102271 55e792 102259->102271 102360 57f73d 59 API calls 2 library calls 102259->102360 102361 57f65e 61 API calls 2 library calls 102259->102361 102362 58737f 59 API calls Mailbox 102259->102362 102363 52750f 59 API calls 2 library calls 102259->102363 102364 527213 59 API calls Mailbox 102259->102364 102268->102259 102367 57f7a1 89 API calls 4 library calls 102271->102367 102274 55e7ab 102275 542d55 _free 58 API calls 102274->102275 102276 55e7be 102275->102276 102276->102256 102277->102151 102278->102166 102279->102166 102280->102166 102281->102166 102282->102166 102283->102160 102285 525c6f CloseHandle 102284->102285 102286 5257dc Mailbox 102285->102286 102287 525c6f CloseHandle 102286->102287 102288 5257eb 102287->102288 102288->102237 102289->102189 102290->102192 102291->102200 102292->102221 102293->102199 102295 527667 59 API calls 102294->102295 102296 5245b1 102295->102296 102297 527667 59 API calls 102296->102297 102298 5245b9 102297->102298 102299 527667 59 API calls 102298->102299 102300 5245c1 102299->102300 102301 527667 59 API calls 102300->102301 102302 5245c9 102301->102302 102303 55d4d2 102302->102303 102304 5245fd 102302->102304 102305 528047 59 API calls 102303->102305 102306 52784b 59 API calls 102304->102306 102307 55d4db 102305->102307 102308 52460b 102306->102308 102309 527d8c 59 API calls 102307->102309 102310 527d2c 59 API calls 102308->102310 102313 524640 102309->102313 102311 524615 102310->102311 102311->102313 102314 52784b 59 API calls 102311->102314 102312 524680 102370 52784b 102312->102370 102313->102312 102315 52465f 102313->102315 102327 55d4fb 102313->102327 102316 524636 102314->102316 102320 5279f2 59 API calls 102315->102320 102319 527d2c 59 API calls 102316->102319 102318 55d5cb 102322 527bcc 59 API calls 102318->102322 102319->102313 102323 524669 102320->102323 102321 524691 102324 5246a3 102321->102324 102325 528047 59 API calls 102321->102325 102341 55d588 102322->102341 102323->102312 102331 52784b 59 API calls 102323->102331 102326 5246b3 102324->102326 102328 528047 59 API calls 102324->102328 102325->102324 102330 5246ba 102326->102330 102332 528047 59 API calls 102326->102332 102327->102318 102329 55d5b4 102327->102329 102339 55d532 102327->102339 102328->102326 102329->102318 102335 55d59f 102329->102335 102333 528047 59 API calls 102330->102333 102340 5246c1 Mailbox 102330->102340 102331->102312 102332->102330 102333->102340 102334 5279f2 59 API calls 102334->102341 102338 527bcc 59 API calls 102335->102338 102336 55d590 102337 527bcc 59 API calls 102336->102337 102337->102341 102338->102341 102339->102336 102343 55d57b 102339->102343 102340->102219 102341->102312 102341->102334 102383 527924 59 API calls 2 library calls 102341->102383 102344 527bcc 59 API calls 102343->102344 102344->102341 102356->102190 102357->102196 102358->102225 102359->102259 102360->102259 102361->102259 102362->102259 102363->102259 102364->102259 102365->102248 102366->102251 102367->102274 102371 5278b7 102370->102371 102372 52785a 102370->102372 102373 527d2c 59 API calls 102371->102373 102372->102371 102374 527865 102372->102374 102379 527888 _memmove 102373->102379 102375 527880 102374->102375 102376 55eb09 102374->102376 102384 527f27 59 API calls Mailbox 102375->102384 102378 528029 59 API calls 102376->102378 102380 55eb13 102378->102380 102379->102321 102381 540db6 Mailbox 59 API calls 102380->102381 102382 55eb33 102381->102382 102383->102341 102384->102379 102386 526d95 102385->102386 102387 526ea9 102385->102387 102386->102387 102388 540db6 Mailbox 59 API calls 102386->102388 102387->101029 102390 526dbc 102388->102390 102389 540db6 Mailbox 59 API calls 102395 526e31 102389->102395 102390->102389 102395->102387 102405 526240 102395->102405 102430 52735d 59 API calls Mailbox 102395->102430 102431 576553 59 API calls Mailbox 102395->102431 102432 52750f 59 API calls 2 library calls 102395->102432 102402 53121b 102396->102402 102397 5314e9 102442 52cbf0 89 API calls 102397->102442 102401 5315e1 102443 589e4a 89 API calls 4 library calls 102401->102443 102402->102397 102402->102401 102403 531452 102402->102403 102441 52cbf0 89 API calls 102402->102441 102403->101031 102404->101033 102406 527a16 59 API calls 102405->102406 102425 526265 102406->102425 102407 52646a 102435 52750f 59 API calls 2 library calls 102407->102435 102409 526484 Mailbox 102409->102395 102412 52750f 59 API calls 102412->102425 102413 55dff6 102438 57f8aa 91 API calls 4 library calls 102413->102438 102417 527d8c 59 API calls 102417->102425 102418 55e004 102439 52750f 59 API calls 2 library calls 102418->102439 102420 526799 _memmove 102440 57f8aa 91 API calls 4 library calls 102420->102440 102422 55df92 102423 528029 59 API calls 102422->102423 102427 55df9d 102423->102427 102425->102407 102425->102412 102425->102413 102425->102417 102425->102420 102425->102422 102426 527e4f 59 API calls 102425->102426 102433 525f6c 60 API calls 102425->102433 102434 525d41 59 API calls Mailbox 102425->102434 102436 525e72 60 API calls 102425->102436 102437 527924 59 API calls 2 library calls 102425->102437 102428 52643b CharUpperBuffW 102426->102428 102429 540db6 Mailbox 59 API calls 102427->102429 102428->102425 102429->102420 102430->102395 102431->102395 102432->102395 102433->102425 102434->102425 102435->102409 102436->102425 102437->102425 102438->102418 102440->102409 102441->102402 102442->102403 102443->102403 102445 5230d2 LoadIconW 102444->102445 102447 523107 102445->102447 102447->101049 102448->101048 103011 521016 103016 524974 103011->103016 103014 542d40 __cinit 67 API calls 103015 521025 103014->103015 103017 540db6 Mailbox 59 API calls 103016->103017 103018 52497c 103017->103018 103019 52101b 103018->103019 103023 524936 103018->103023 103019->103014 103024 524951 103023->103024 103025 52493f 103023->103025 103027 5249a0 103024->103027 103026 542d40 __cinit 67 API calls 103025->103026 103026->103024 103028 527667 59 API calls 103027->103028 103029 5249b8 GetVersionExW 103028->103029 103030 527bcc 59 API calls 103029->103030 103031 5249fb 103030->103031 103032 527d2c 59 API calls 103031->103032 103037 524a28 103031->103037 103033 524a1c 103032->103033 103034 527726 59 API calls 103033->103034 103034->103037 103035 524a93 GetCurrentProcess IsWow64Process 103036 524aac 103035->103036 103039 524ac2 103036->103039 103040 524b2b GetSystemInfo 103036->103040 103037->103035 103038 55d864 103037->103038 103051 524b37 103039->103051 103041 524af8 103040->103041 103041->103019 103044 524ad4 103047 524b37 2 API calls 103044->103047 103045 524b1f GetSystemInfo 103046 524ae9 103045->103046 103046->103041 103049 524aef FreeLibrary 103046->103049 103048 524adc GetNativeSystemInfo 103047->103048 103048->103046 103049->103041 103052 524ad0 103051->103052 103053 524b40 LoadLibraryA 103051->103053 103052->103044 103052->103045 103053->103052 103054 524b51 GetProcAddress 103053->103054 103054->103052 103055 521055 103060 522649 103055->103060 103058 542d40 __cinit 67 API calls 103059 521064 103058->103059 103061 527667 59 API calls 103060->103061 103062 5226b7 103061->103062 103067 523582 103062->103067 103064 522754 103066 52105a 103064->103066 103070 523416 59 API calls 2 library calls 103064->103070 103066->103058 103071 5235b0 103067->103071 103070->103064 103072 5235a1 103071->103072 103073 5235bd 103071->103073 103072->103064 103073->103072 103074 5235c4 RegOpenKeyExW 103073->103074 103074->103072 103075 5235de RegQueryValueExW 103074->103075 103076 523614 RegCloseKey 103075->103076 103077 5235ff 103075->103077 103076->103072 103077->103076 103078 55fdfc 103117 52ab30 Mailbox _memmove 103078->103117 103080 57617e Mailbox 59 API calls 103100 52a057 103080->103100 103081 529c90 Mailbox 59 API calls 103081->103117 103084 52b525 103184 589e4a 89 API calls 4 library calls 103084->103184 103085 560055 103183 589e4a 89 API calls 4 library calls 103085->103183 103086 540db6 59 API calls Mailbox 103106 529f37 Mailbox 103086->103106 103087 52b900 60 API calls 103087->103106 103088 52b475 103095 528047 59 API calls 103088->103095 103091 560064 103092 52b47a 103092->103085 103105 5609e5 103092->103105 103095->103100 103097 528047 59 API calls 103097->103106 103098 527667 59 API calls 103098->103106 103099 542d40 67 API calls __cinit 103099->103106 103101 576e8f 59 API calls 103101->103106 103102 527de1 59 API calls 103102->103117 103103 5609d6 103187 589e4a 89 API calls 4 library calls 103103->103187 103188 589e4a 89 API calls 4 library calls 103105->103188 103106->103085 103106->103086 103106->103087 103106->103088 103106->103092 103106->103097 103106->103098 103106->103099 103106->103100 103106->103101 103106->103103 103107 52a55a 103106->103107 103180 52c8c0 331 API calls 2 library calls 103106->103180 103186 589e4a 89 API calls 4 library calls 103107->103186 103108 59bc6b 331 API calls 103108->103117 103110 540db6 59 API calls Mailbox 103110->103117 103111 529ea0 331 API calls 103111->103117 103113 56086a 103114 529c90 Mailbox 59 API calls 103113->103114 103118 56085c 103114->103118 103115 560878 103185 589e4a 89 API calls 4 library calls 103115->103185 103117->103081 103117->103084 103117->103100 103117->103102 103117->103106 103117->103108 103117->103110 103117->103111 103117->103113 103117->103115 103117->103118 103119 52b21c 103117->103119 103123 52b2b6 103117->103123 103124 576e8f 59 API calls 103117->103124 103125 59445a 331 API calls 103117->103125 103129 588715 103117->103129 103133 59df23 103117->103133 103136 59df37 103117->103136 103139 59c2e0 103117->103139 103171 587956 103117->103171 103177 57617e 103117->103177 103182 59c193 85 API calls 2 library calls 103117->103182 103118->103080 103118->103100 103120 529d3c 60 API calls 103119->103120 103121 52b22d 103120->103121 103122 529d3c 60 API calls 103121->103122 103122->103123 103181 52f6a3 331 API calls 103123->103181 103124->103117 103125->103117 103130 58871e 103129->103130 103132 588723 103129->103132 103189 5877b3 103130->103189 103132->103117 103212 59cadd 103133->103212 103135 59df33 103135->103117 103137 59cadd 130 API calls 103136->103137 103138 59df47 103137->103138 103138->103117 103140 527667 59 API calls 103139->103140 103141 59c2f4 103140->103141 103142 527667 59 API calls 103141->103142 103143 59c2fc 103142->103143 103144 527667 59 API calls 103143->103144 103145 59c304 103144->103145 103146 529837 84 API calls 103145->103146 103170 59c312 103146->103170 103147 527bcc 59 API calls 103147->103170 103148 59c4fb 103149 59c528 Mailbox 103148->103149 103303 529a3c 59 API calls Mailbox 103148->103303 103149->103117 103150 59c4e2 103153 527cab 59 API calls 103150->103153 103152 59c4fd 103155 527cab 59 API calls 103152->103155 103157 59c4ef 103153->103157 103154 527924 59 API calls 103154->103170 103158 59c50c 103155->103158 103156 528047 59 API calls 103156->103170 103160 527b2e 59 API calls 103157->103160 103161 527b2e 59 API calls 103158->103161 103159 527e4f 59 API calls 103163 59c3a9 CharUpperBuffW 103159->103163 103160->103148 103161->103148 103162 527e4f 59 API calls 103164 59c469 CharUpperBuffW 103162->103164 103301 52843a 68 API calls 103163->103301 103302 52c5a7 69 API calls 2 library calls 103164->103302 103167 527cab 59 API calls 103167->103170 103168 529837 84 API calls 103168->103170 103169 527b2e 59 API calls 103169->103170 103170->103147 103170->103148 103170->103149 103170->103150 103170->103152 103170->103154 103170->103156 103170->103159 103170->103162 103170->103167 103170->103168 103170->103169 103172 587962 103171->103172 103173 540db6 Mailbox 59 API calls 103172->103173 103174 587970 103173->103174 103175 527667 59 API calls 103174->103175 103176 58797e 103174->103176 103175->103176 103176->103117 103304 5760c0 103177->103304 103179 57618c 103179->103117 103180->103106 103181->103084 103182->103117 103183->103091 103184->103118 103185->103118 103186->103100 103187->103105 103188->103100 103190 5877ca 103189->103190 103206 5878ea 103189->103206 103191 58780a 103190->103191 103192 5877e2 103190->103192 103195 587821 103190->103195 103193 540db6 Mailbox 59 API calls 103191->103193 103192->103191 103196 5877f2 103192->103196 103194 587800 Mailbox _memmove 103193->103194 103203 540db6 Mailbox 59 API calls 103194->103203 103197 540db6 Mailbox 59 API calls 103195->103197 103209 58783e 103195->103209 103204 540db6 Mailbox 59 API calls 103196->103204 103197->103209 103198 587869 103201 540db6 Mailbox 59 API calls 103198->103201 103199 587877 103200 540db6 Mailbox 59 API calls 103199->103200 103202 58787d 103200->103202 103201->103194 103210 58746b 59 API calls Mailbox 103202->103210 103203->103206 103204->103194 103206->103132 103207 587889 103211 525a15 61 API calls Mailbox 103207->103211 103209->103194 103209->103198 103209->103199 103210->103207 103211->103194 103213 529837 84 API calls 103212->103213 103214 59cb1a 103213->103214 103233 59cb61 Mailbox 103214->103233 103250 59d7a5 103214->103250 103216 59cdb9 103217 59cf2e 103216->103217 103221 59cdc7 103216->103221 103288 59d8c8 92 API calls Mailbox 103217->103288 103220 59cf3d 103220->103221 103223 59cf49 103220->103223 103263 59c96e 103221->103263 103222 529837 84 API calls 103239 59cbb2 Mailbox 103222->103239 103223->103233 103228 59ce00 103278 540c08 103228->103278 103231 59ce1a 103284 589e4a 89 API calls 4 library calls 103231->103284 103232 59ce33 103235 5292ce 59 API calls 103232->103235 103233->103135 103237 59ce3f 103235->103237 103236 59ce25 GetCurrentProcess TerminateProcess 103236->103232 103238 529050 59 API calls 103237->103238 103240 59ce55 103238->103240 103239->103216 103239->103222 103239->103233 103282 59fbce 59 API calls 2 library calls 103239->103282 103283 59cfdf 61 API calls 2 library calls 103239->103283 103241 59ce7c 103240->103241 103285 528d40 59 API calls Mailbox 103240->103285 103243 59cfa4 103241->103243 103249 529d3c 60 API calls 103241->103249 103287 528d40 59 API calls Mailbox 103241->103287 103289 59d649 107 API calls _free 103241->103289 103243->103233 103247 59cfb8 FreeLibrary 103243->103247 103244 59ce6b 103286 59d649 107 API calls _free 103244->103286 103247->103233 103249->103241 103251 527e4f 59 API calls 103250->103251 103252 59d7c0 CharLowerBuffW 103251->103252 103290 57f167 103252->103290 103256 527667 59 API calls 103257 59d7f9 103256->103257 103258 52784b 59 API calls 103257->103258 103259 59d810 103258->103259 103260 527d2c 59 API calls 103259->103260 103261 59d81c Mailbox 103260->103261 103262 59d858 Mailbox 103261->103262 103297 59cfdf 61 API calls 2 library calls 103261->103297 103262->103239 103264 59c989 103263->103264 103268 59c9de 103263->103268 103265 540db6 Mailbox 59 API calls 103264->103265 103267 59c9ab 103265->103267 103266 540db6 Mailbox 59 API calls 103266->103267 103267->103266 103267->103268 103269 59da50 103268->103269 103270 59dc79 Mailbox 103269->103270 103274 59da73 _strcat _wcscpy __wsetenvp 103269->103274 103270->103228 103271 529be6 59 API calls 103271->103274 103272 529b3c 59 API calls 103272->103274 103273 529b98 59 API calls 103273->103274 103274->103270 103274->103271 103274->103272 103274->103273 103275 54571c 58 API calls __crtLCMapStringA_stat 103274->103275 103276 529837 84 API calls 103274->103276 103300 585887 61 API calls 2 library calls 103274->103300 103275->103274 103276->103274 103280 540c1d 103278->103280 103279 540cb5 VirtualProtect 103281 540c83 103279->103281 103280->103279 103280->103281 103281->103231 103281->103232 103282->103239 103283->103239 103284->103236 103285->103244 103286->103241 103287->103241 103288->103220 103289->103241 103291 57f192 __wsetenvp 103290->103291 103292 57f1d1 103291->103292 103294 57f1c7 103291->103294 103295 57f278 103291->103295 103292->103256 103292->103261 103294->103292 103298 5278c4 61 API calls 103294->103298 103295->103292 103299 5278c4 61 API calls 103295->103299 103297->103262 103298->103294 103299->103295 103300->103274 103301->103170 103302->103170 103303->103149 103305 5760cb 103304->103305 103306 5760e8 103304->103306 103305->103306 103308 5760ab 59 API calls Mailbox 103305->103308 103306->103179 103308->103305 103309 521078 103314 52708b 103309->103314 103311 52108c 103312 542d40 __cinit 67 API calls 103311->103312 103313 521096 103312->103313 103315 52709b __ftell_nolock 103314->103315 103316 527667 59 API calls 103315->103316 103317 527151 103316->103317 103318 524706 61 API calls 103317->103318 103319 52715a 103318->103319 103345 54050b 103319->103345 103322 527cab 59 API calls 103323 527173 103322->103323 103324 523f74 59 API calls 103323->103324 103325 527182 103324->103325 103326 527667 59 API calls 103325->103326 103327 52718b 103326->103327 103328 527d8c 59 API calls 103327->103328 103329 527194 RegOpenKeyExW 103328->103329 103330 55e8b1 RegQueryValueExW 103329->103330 103334 5271b6 Mailbox 103329->103334 103331 55e943 RegCloseKey 103330->103331 103332 55e8ce 103330->103332 103331->103334 103338 55e955 _wcscat Mailbox __wsetenvp 103331->103338 103333 540db6 Mailbox 59 API calls 103332->103333 103335 55e8e7 103333->103335 103334->103311 103337 52522e 59 API calls 103335->103337 103336 5279f2 59 API calls 103336->103338 103339 55e8f2 RegQueryValueExW 103337->103339 103338->103334 103338->103336 103343 527de1 59 API calls 103338->103343 103344 523f74 59 API calls 103338->103344 103340 55e90f 103339->103340 103342 55e929 103339->103342 103341 527bcc 59 API calls 103340->103341 103341->103342 103342->103331 103343->103338 103344->103338 103346 551940 __ftell_nolock 103345->103346 103347 540518 GetFullPathNameW 103346->103347 103348 54053a 103347->103348 103349 527bcc 59 API calls 103348->103349 103350 527165 103349->103350 103350->103322 103351 52be19 103352 52be22 103351->103352 103365 52baab 103351->103365 103353 529837 84 API calls 103352->103353 103361 52ba8b Mailbox 103352->103361 103352->103365 103354 52be4d 103353->103354 103355 56107b 103354->103355 103356 52be5d 103354->103356 103366 577bdb 59 API calls _memmove 103355->103366 103357 527a51 59 API calls 103356->103357 103357->103361 103359 561085 103360 528047 59 API calls 103359->103360 103360->103361 103363 561361 103361->103363 103361->103365 103368 528cd4 59 API calls Mailbox 103361->103368 103363->103365 103367 543d46 59 API calls __wtof_l 103363->103367 103366->103359 103367->103365 103368->103361 103369 55fe27 103382 53f944 103369->103382 103371 55fe3d 103372 55fe53 103371->103372 103373 55febe 103371->103373 103391 529e5d 60 API calls 103372->103391 103376 52fce0 331 API calls 103373->103376 103375 55fe92 103377 56089c 103375->103377 103378 55fe9a 103375->103378 103381 55feb2 Mailbox 103376->103381 103393 589e4a 89 API calls 4 library calls 103377->103393 103392 58834f 59 API calls Mailbox 103378->103392 103383 53f962 103382->103383 103384 53f950 103382->103384 103386 53f991 103383->103386 103387 53f968 103383->103387 103385 529d3c 60 API calls 103384->103385 103390 53f95a 103385->103390 103389 529d3c 60 API calls 103386->103389 103388 540db6 Mailbox 59 API calls 103387->103388 103388->103390 103389->103390 103390->103371 103391->103375 103392->103381 103393->103381 103394 521066 103399 52f76f 103394->103399 103396 52106c 103397 542d40 __cinit 67 API calls 103396->103397 103398 521076 103397->103398 103400 52f790 103399->103400 103432 53ff03 103400->103432 103404 52f7d7 103405 527667 59 API calls 103404->103405 103406 52f7e1 103405->103406 103407 527667 59 API calls 103406->103407 103408 52f7eb 103407->103408 103409 527667 59 API calls 103408->103409 103410 52f7f5 103409->103410 103411 527667 59 API calls 103410->103411 103412 52f833 103411->103412 103413 527667 59 API calls 103412->103413 103414 52f8fe 103413->103414 103442 535f87 103414->103442 103418 52f930 103419 527667 59 API calls 103418->103419 103420 52f93a 103419->103420 103470 53fd9e 103420->103470 103422 52f981 103423 52f991 GetStdHandle 103422->103423 103424 5645ab 103423->103424 103425 52f9dd 103423->103425 103424->103425 103426 5645b4 103424->103426 103427 52f9e5 OleInitialize 103425->103427 103477 586b38 64 API calls Mailbox 103426->103477 103427->103396 103429 5645bb 103478 587207 CreateThread 103429->103478 103431 5645c7 CloseHandle 103431->103427 103479 53ffdc 103432->103479 103435 53ffdc 59 API calls 103436 53ff45 103435->103436 103437 527667 59 API calls 103436->103437 103438 53ff51 103437->103438 103439 527bcc 59 API calls 103438->103439 103440 52f796 103439->103440 103441 540162 6 API calls 103440->103441 103441->103404 103443 527667 59 API calls 103442->103443 103444 535f97 103443->103444 103445 527667 59 API calls 103444->103445 103446 535f9f 103445->103446 103486 535a9d 103446->103486 103449 535a9d 59 API calls 103450 535faf 103449->103450 103451 527667 59 API calls 103450->103451 103452 535fba 103451->103452 103453 540db6 Mailbox 59 API calls 103452->103453 103454 52f908 103453->103454 103455 5360f9 103454->103455 103456 536107 103455->103456 103457 527667 59 API calls 103456->103457 103458 536112 103457->103458 103459 527667 59 API calls 103458->103459 103460 53611d 103459->103460 103461 527667 59 API calls 103460->103461 103462 536128 103461->103462 103463 527667 59 API calls 103462->103463 103464 536133 103463->103464 103465 535a9d 59 API calls 103464->103465 103466 53613e 103465->103466 103467 540db6 Mailbox 59 API calls 103466->103467 103468 536145 RegisterClipboardFormatW 103467->103468 103468->103418 103471 57576f 103470->103471 103472 53fdae 103470->103472 103489 589ae7 60 API calls 103471->103489 103473 540db6 Mailbox 59 API calls 103472->103473 103475 53fdb6 103473->103475 103475->103422 103476 57577a 103477->103429 103478->103431 103490 5871ed 65 API calls 103478->103490 103480 527667 59 API calls 103479->103480 103481 53ffe7 103480->103481 103482 527667 59 API calls 103481->103482 103483 53ffef 103482->103483 103484 527667 59 API calls 103483->103484 103485 53ff3b 103484->103485 103485->103435 103487 527667 59 API calls 103486->103487 103488 535aa5 103487->103488 103488->103449 103489->103476 103491 647a10 103492 647a20 103491->103492 103493 647b3a LoadLibraryA 103492->103493 103498 647b7f VirtualProtect VirtualProtect 103492->103498 103494 647b51 103493->103494 103494->103492 103497 647b63 GetProcAddress 103494->103497 103496 647be4 103496->103496 103497->103494 103499 647b79 ExitProcess 103497->103499 103498->103496 103500 531366 103506 53121b 103500->103506 103509 53fe64 103500->103509 103502 5314e9 103515 52cbf0 89 API calls 103502->103515 103504 5315e1 103516 589e4a 89 API calls 4 library calls 103504->103516 103506->103502 103506->103504 103508 531452 103506->103508 103514 52cbf0 89 API calls 103506->103514 103510 575783 103509->103510 103511 53fe74 103509->103511 103512 540db6 Mailbox 59 API calls 103511->103512 103513 53fe7b 103512->103513 103513->103506 103514->103506 103515->103508 103516->103508 103517 56416f 103521 575fe6 103517->103521 103519 56417a 103520 575fe6 85 API calls 103519->103520 103520->103519 103522 576020 103521->103522 103527 575ff3 103521->103527 103522->103519 103523 576022 103533 529328 84 API calls Mailbox 103523->103533 103525 576027 103526 529837 84 API calls 103525->103526 103528 57602e 103526->103528 103527->103522 103527->103523 103527->103525 103530 57601a 103527->103530 103529 527b2e 59 API calls 103528->103529 103529->103522 103532 5295a0 59 API calls _wcsstr 103530->103532 103532->103522 103533->103525 103534 52e5ab 103537 52d100 103534->103537 103536 52e5b9 103538 52d11d 103537->103538 103555 52d37d 103537->103555 103539 5626e0 103538->103539 103540 562691 103538->103540 103560 52d144 103538->103560 103581 59a3e6 331 API calls __cinit 103539->103581 103542 562694 103540->103542 103551 5626af 103540->103551 103544 5626a0 103542->103544 103542->103560 103579 59a9fa 331 API calls 103544->103579 103545 542d40 __cinit 67 API calls 103545->103560 103548 52d434 103573 528a52 68 API calls 103548->103573 103549 5628b5 103549->103549 103550 52d54b 103550->103536 103551->103555 103580 59aea2 331 API calls 3 library calls 103551->103580 103555->103550 103585 589e4a 89 API calls 4 library calls 103555->103585 103556 5627fc 103584 59a751 89 API calls 103556->103584 103557 52d443 103557->103536 103560->103545 103560->103548 103560->103550 103560->103555 103560->103556 103561 5284c0 69 API calls 103560->103561 103566 529d3c 60 API calls 103560->103566 103568 529ea0 331 API calls 103560->103568 103569 528047 59 API calls 103560->103569 103571 528740 68 API calls __cinit 103560->103571 103572 528542 68 API calls 103560->103572 103574 52843a 68 API calls 103560->103574 103575 52cf7c 331 API calls 103560->103575 103576 529dda 59 API calls Mailbox 103560->103576 103577 52cf00 89 API calls 103560->103577 103578 52cd7d 331 API calls 103560->103578 103582 528a52 68 API calls 103560->103582 103583 57678d 60 API calls 103560->103583 103561->103560 103566->103560 103568->103560 103569->103560 103571->103560 103572->103560 103573->103557 103574->103560 103575->103560 103576->103560 103577->103560 103578->103560 103579->103550 103580->103555 103581->103560 103582->103560 103583->103560 103584->103555 103585->103549

                              Control-flow Graph

                              APIs
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00523B68
                              • IsDebuggerPresent.KERNEL32 ref: 00523B7A
                              • GetFullPathNameW.KERNEL32(00007FFF,?,?,005E52F8,005E52E0,?,?), ref: 00523BEB
                                • Part of subcall function 00527BCC: _memmove.LIBCMT ref: 00527C06
                                • Part of subcall function 0053092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00523C14,005E52F8,?,?,?), ref: 0053096E
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00523C6F
                              • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,005D7770,00000010), ref: 0055D281
                              • SetCurrentDirectoryW.KERNEL32(?,005E52F8,?,?,?), ref: 0055D2B9
                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,005D4260,005E52F8,?,?,?), ref: 0055D33F
                              • ShellExecuteW.SHELL32(00000000,?,?), ref: 0055D346
                                • Part of subcall function 00523A46: GetSysColorBrush.USER32(0000000F), ref: 00523A50
                                • Part of subcall function 00523A46: LoadCursorW.USER32(00000000,00007F00), ref: 00523A5F
                                • Part of subcall function 00523A46: LoadIconW.USER32(00000063), ref: 00523A76
                                • Part of subcall function 00523A46: LoadIconW.USER32(000000A4), ref: 00523A88
                                • Part of subcall function 00523A46: LoadIconW.USER32(000000A2), ref: 00523A9A
                                • Part of subcall function 00523A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00523AC0
                                • Part of subcall function 00523A46: RegisterClassExW.USER32(?), ref: 00523B16
                                • Part of subcall function 005239D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00523A03
                                • Part of subcall function 005239D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00523A24
                                • Part of subcall function 005239D5: ShowWindow.USER32(00000000,?,?), ref: 00523A38
                                • Part of subcall function 005239D5: ShowWindow.USER32(00000000,?,?), ref: 00523A41
                                • Part of subcall function 0052434A: _memset.LIBCMT ref: 00524370
                                • Part of subcall function 0052434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00524415
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                              • String ID: This is a third-party compiled AutoIt script.$runas$%[
                              • API String ID: 529118366-1425557641
                              • Opcode ID: 62fcfc5289e31b58a2ed8adc64b47f9bf69ddf20e667eacc0f1cf1c0c5c44c2f
                              • Instruction ID: a44fc02c57c23bdb3c85f7b29dc5a53b74c39b86a3093ac2ca5ea67b65e1dc8b
                              • Opcode Fuzzy Hash: 62fcfc5289e31b58a2ed8adc64b47f9bf69ddf20e667eacc0f1cf1c0c5c44c2f
                              • Instruction Fuzzy Hash: 44513835D08159AACF15EBF4FC49AED7F78BF9A304F004066F551B61E1EA744A09DB20

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 758 523633-523681 760 523683-523686 758->760 761 5236e1-5236e3 758->761 763 5236e7 760->763 764 523688-52368f 760->764 761->760 762 5236e5 761->762 765 5236ca-5236d2 NtdllDefWindowProc_W 762->765 766 55d0cc-55d0fa call 531070 call 531093 763->766 767 5236ed-5236f0 763->767 768 523695-52369a 764->768 769 52374b-523753 PostQuitMessage 764->769 773 5236d8-5236de 765->773 801 55d0ff-55d106 766->801 774 5236f2-5236f3 767->774 775 523715-52373c SetTimer RegisterClipboardFormatW 767->775 770 55d154-55d168 call 582527 768->770 771 5236a0-5236a2 768->771 772 523711-523713 769->772 770->772 795 55d16e 770->795 778 523755-52375f call 5244a0 771->778 779 5236a8-5236ad 771->779 772->773 782 55d06f-55d072 774->782 783 5236f9-52370c KillTimer call 52443a call 523114 774->783 775->772 780 52373e-523749 CreatePopupMenu 775->780 796 523764 778->796 785 5236b3-5236b8 779->785 786 55d139-55d140 779->786 780->772 789 55d074-55d076 782->789 790 55d0a8-55d0c7 MoveWindow 782->790 783->772 793 55d124-55d134 call 582d36 785->793 794 5236be-5236c4 785->794 786->765 800 55d146-55d14f call 577c36 786->800 797 55d097-55d0a3 SetFocus 789->797 798 55d078-55d07b 789->798 790->772 793->772 794->765 794->801 795->765 796->772 797->772 798->794 802 55d081-55d092 call 531070 798->802 800->765 801->765 807 55d10c-55d11f call 52443a call 52434a 801->807 802->772 807->765
                              APIs
                              • NtdllDefWindowProc_W.NTDLL(?,?,?,?), ref: 005236D2
                              • KillTimer.USER32(?,00000001), ref: 005236FC
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0052371F
                              • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 0052372A
                              • CreatePopupMenu.USER32 ref: 0052373E
                              • PostQuitMessage.USER32(00000000), ref: 0052374D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Timer$ClipboardCreateFormatKillMenuMessageNtdllPopupPostProc_QuitRegisterWindow
                              • String ID: TaskbarCreated$%[
                              • API String ID: 157504867-3028661578
                              • Opcode ID: 3444cdc9bd31aa2101995ac686f7e82b27f019ca79c6c885003be741fa875aa2
                              • Instruction ID: 33a0258d3b897f3ea177f84b0396cbf33cc03eb95dd31d98d44172e5699fae68
                              • Opcode Fuzzy Hash: 3444cdc9bd31aa2101995ac686f7e82b27f019ca79c6c885003be741fa875aa2
                              • Instruction Fuzzy Hash: 19417BB2100555BBCF285F64FC4DB793F98FF12300F140425FA82962F1E669AE09A761

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1043 5249a0-524a00 call 527667 GetVersionExW call 527bcc 1048 524a06 1043->1048 1049 524b0b-524b0d 1043->1049 1051 524a09-524a0e 1048->1051 1050 55d767-55d773 1049->1050 1052 55d774-55d778 1050->1052 1053 524b12-524b13 1051->1053 1054 524a14 1051->1054 1056 55d77b-55d787 1052->1056 1057 55d77a 1052->1057 1055 524a15-524a4c call 527d2c call 527726 1053->1055 1054->1055 1065 524a52-524a53 1055->1065 1066 55d864-55d867 1055->1066 1056->1052 1059 55d789-55d78e 1056->1059 1057->1056 1059->1051 1061 55d794-55d79b 1059->1061 1061->1050 1063 55d79d 1061->1063 1067 55d7a2-55d7a5 1063->1067 1065->1067 1068 524a59-524a64 1065->1068 1069 55d880-55d884 1066->1069 1070 55d869 1066->1070 1071 524a93-524aaa GetCurrentProcess IsWow64Process 1067->1071 1072 55d7ab-55d7c9 1067->1072 1077 524a6a-524a6c 1068->1077 1078 55d7ea-55d7f0 1068->1078 1073 55d886-55d88f 1069->1073 1074 55d86f-55d878 1069->1074 1079 55d86c 1070->1079 1075 524aaf-524ac0 1071->1075 1076 524aac 1071->1076 1072->1071 1080 55d7cf-55d7d5 1072->1080 1073->1079 1083 55d891-55d894 1073->1083 1074->1069 1084 524ac2-524ad2 call 524b37 1075->1084 1085 524b2b-524b35 GetSystemInfo 1075->1085 1076->1075 1086 55d805-55d811 1077->1086 1087 524a72-524a75 1077->1087 1081 55d7f2-55d7f5 1078->1081 1082 55d7fa-55d800 1078->1082 1079->1074 1088 55d7d7-55d7da 1080->1088 1089 55d7df-55d7e5 1080->1089 1081->1071 1082->1071 1083->1074 1100 524ad4-524ae1 call 524b37 1084->1100 1101 524b1f-524b29 GetSystemInfo 1084->1101 1092 524af8-524b08 1085->1092 1093 55d813-55d816 1086->1093 1094 55d81b-55d821 1086->1094 1090 55d831-55d834 1087->1090 1091 524a7b-524a8a 1087->1091 1088->1071 1089->1071 1090->1071 1099 55d83a-55d84f 1090->1099 1096 524a90 1091->1096 1097 55d826-55d82c 1091->1097 1093->1071 1094->1071 1096->1071 1097->1071 1102 55d851-55d854 1099->1102 1103 55d859-55d85f 1099->1103 1108 524ae3-524ae7 GetNativeSystemInfo 1100->1108 1109 524b18-524b1d 1100->1109 1104 524ae9-524aed 1101->1104 1102->1071 1103->1071 1104->1092 1107 524aef-524af2 FreeLibrary 1104->1107 1107->1092 1108->1104 1109->1108
                              APIs
                              • GetVersionExW.KERNEL32(?), ref: 005249CD
                                • Part of subcall function 00527BCC: _memmove.LIBCMT ref: 00527C06
                              • GetCurrentProcess.KERNEL32(?,005AFAEC,00000000,00000000,?), ref: 00524A9A
                              • IsWow64Process.KERNEL32(00000000), ref: 00524AA1
                              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00524AE7
                              • FreeLibrary.KERNEL32(00000000), ref: 00524AF2
                              • GetSystemInfo.KERNEL32(00000000), ref: 00524B23
                              • GetSystemInfo.KERNEL32(00000000), ref: 00524B2F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                              • String ID:
                              • API String ID: 1986165174-0
                              • Opcode ID: 6eb641d4a43794fc0230aa94ee4f8c6d82a8fbe037cd12df2425c43f88b43746
                              • Instruction ID: 4ad3055bf0d727d1dbbb0184e710e287d495473786e508019d6cfd712117e3ea
                              • Opcode Fuzzy Hash: 6eb641d4a43794fc0230aa94ee4f8c6d82a8fbe037cd12df2425c43f88b43746
                              • Instruction Fuzzy Hash: 0891C4319897D1DEC731CB6894901AEBFF5BF3A301B444DAED0CB93A81D220A50CDB69

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1110 524e89-524ea1 CreateStreamOnHGlobal 1111 524ea3-524eba FindResourceExW 1110->1111 1112 524ec1-524ec6 1110->1112 1113 524ec0 1111->1113 1114 55d933-55d942 LoadResource 1111->1114 1113->1112 1114->1113 1115 55d948-55d956 SizeofResource 1114->1115 1115->1113 1116 55d95c-55d967 LockResource 1115->1116 1116->1113 1117 55d96d-55d98b 1116->1117 1117->1113
                              APIs
                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00524E99
                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00524D8E,?,?,00000000,00000000), ref: 00524EB0
                              • LoadResource.KERNEL32(?,00000000,?,?,00524D8E,?,?,00000000,00000000,?,?,?,?,?,?,00524E2F), ref: 0055D937
                              • SizeofResource.KERNEL32(?,00000000,?,?,00524D8E,?,?,00000000,00000000,?,?,?,?,?,?,00524E2F), ref: 0055D94C
                              • LockResource.KERNEL32(00524D8E,?,?,00524D8E,?,?,00000000,00000000,?,?,?,?,?,?,00524E2F,00000000), ref: 0055D95F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                              • String ID: SCRIPT
                              • API String ID: 3051347437-3967369404
                              • Opcode ID: 8dab87858b0234e15a50ecf078eb081f4e96ac4d8ba0a1e5917a8881d47b9aa0
                              • Instruction ID: 2d9a63e9f0535642ec956c231844724284115d707d3a5b87a710b48a78b88c42
                              • Opcode Fuzzy Hash: 8dab87858b0234e15a50ecf078eb081f4e96ac4d8ba0a1e5917a8881d47b9aa0
                              • Instruction Fuzzy Hash: F5114876240701BBE7218BA5EC48F677BBEFFC6B11F204268F40686290DB71E8049B61
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: pb^$%[
                              • API String ID: 3964851224-1575657069
                              • Opcode ID: 6865c163a799d89becdb897080aee3c7498a009c88a4e93ee89b78b0de4be8ed
                              • Instruction ID: 58aa64ca9160a5fa4d93ded9b6dc81cc2293e9c3ff90aacca00315c645531432
                              • Opcode Fuzzy Hash: 6865c163a799d89becdb897080aee3c7498a009c88a4e93ee89b78b0de4be8ed
                              • Instruction Fuzzy Hash: 629289746083518FD724DF24C494B2ABBE5BF85304F14996DE88A8B3A2D771EC45CF92
                              APIs
                              • LoadLibraryA.KERNEL32(?), ref: 00647B4A
                              • GetProcAddress.KERNEL32(?,00640FF9), ref: 00647B68
                              • ExitProcess.KERNEL32(?,00640FF9), ref: 00647B79
                              • VirtualProtect.KERNELBASE(00520000,00001000,00000004,?,00000000), ref: 00647BC7
                              • VirtualProtect.KERNEL32(00520000,00001000), ref: 00647BDC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ProtectVirtual$AddressExitLibraryLoadProcProcess
                              • String ID:
                              • API String ID: 1996367037-0
                              • Opcode ID: b9ab5955e5271f7defc3f14e4e1c083b42a7b0c3b0ce0f043560cbea1fcf72c9
                              • Instruction ID: 4d1c7a42a18438da02d6fac36d2a77f040f862bafdcfbc9ba81b3bcaff09b56d
                              • Opcode Fuzzy Hash: b9ab5955e5271f7defc3f14e4e1c083b42a7b0c3b0ce0f043560cbea1fcf72c9
                              • Instruction Fuzzy Hash: 975139B2A5C7524FD7219EB8CCC06E877A6EB1132072C0779C5E2C73C5E7A05E4687A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID: Dd^$Dd^$Dd^$Dd^$Variable must be of type 'Object'.
                              • API String ID: 0-1160235969
                              • Opcode ID: 37fc9cca29bf1789f8a3e0ff9e6875ea0e8bf33139e71c4a5fd87eef504d4add
                              • Instruction ID: d81f9a1e72d190aa30ce4893d3f17772a1b7dd182989e5baaa423dbb8651e119
                              • Opcode Fuzzy Hash: 37fc9cca29bf1789f8a3e0ff9e6875ea0e8bf33139e71c4a5fd87eef504d4add
                              • Instruction Fuzzy Hash: 85A29E75A00225CFCB24CF54E485AAEBFB5FF5A310F248469E945AB391D731ED42CB90
                              APIs
                              • GetFileAttributesW.KERNELBASE(?,0055E398), ref: 0058446A
                              • FindFirstFileW.KERNELBASE(?,?), ref: 0058447B
                              • FindClose.KERNEL32(00000000), ref: 0058448B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: FileFind$AttributesCloseFirst
                              • String ID:
                              • API String ID: 48322524-0
                              • Opcode ID: c18845af6850f1226936388eeb9f94b0f582a941f0c932dd59931ea2af018c03
                              • Instruction ID: 3b8812d4aa2743dba89463929cfa54e0a7bd2963a4a54787ebf44c36f70925af
                              • Opcode Fuzzy Hash: c18845af6850f1226936388eeb9f94b0f582a941f0c932dd59931ea2af018c03
                              • Instruction Fuzzy Hash: 1FE0D8364105016746107B78EC0D5ED7F9CAE16335F100B16FC36D10F0E7B45D04AB95
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00530A5B
                              • timeGetTime.WINMM ref: 00530D16
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00530E53
                              • Sleep.KERNEL32(0000000A), ref: 00530E61
                              • LockWindowUpdate.USER32(00000000,?,?), ref: 00530EFA
                              • DestroyWindow.USER32 ref: 00530F06
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00530F20
                              • Sleep.KERNEL32(0000000A,?,?), ref: 00564E83
                              • TranslateMessage.USER32(?), ref: 00565C60
                              • DispatchMessageW.USER32(?), ref: 00565C6E
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00565C82
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pb^$pb^$pb^$pb^
                              • API String ID: 4212290369-4286532560
                              • Opcode ID: 8e2ad12e9cfe5c7c0e4b9b4ca02b35e64d7ce887708fb04396cacae3f3442fe6
                              • Instruction ID: cb5c99ed1999387d08efde794daf56b45df9a5529c446962a0a4f8c1bc0d2b56
                              • Opcode Fuzzy Hash: 8e2ad12e9cfe5c7c0e4b9b4ca02b35e64d7ce887708fb04396cacae3f3442fe6
                              • Instruction Fuzzy Hash: ACB2C270608742DFD728DF24C898BAEBFE4BF85304F14491DE589972A1DB71E884DB82

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00588F5F: __time64.LIBCMT ref: 00588F69
                                • Part of subcall function 00524EE5: _fseek.LIBCMT ref: 00524EFD
                              • __wsplitpath.LIBCMT ref: 00589234
                                • Part of subcall function 005440FB: __wsplitpath_helper.LIBCMT ref: 0054413B
                              • _wcscpy.LIBCMT ref: 00589247
                              • _wcscat.LIBCMT ref: 0058925A
                              • __wsplitpath.LIBCMT ref: 0058927F
                              • _wcscat.LIBCMT ref: 00589295
                              • _wcscat.LIBCMT ref: 005892A8
                                • Part of subcall function 00588FA5: _memmove.LIBCMT ref: 00588FDE
                                • Part of subcall function 00588FA5: _memmove.LIBCMT ref: 00588FED
                              • _wcscmp.LIBCMT ref: 005891EF
                                • Part of subcall function 00589734: _wcscmp.LIBCMT ref: 00589824
                                • Part of subcall function 00589734: _wcscmp.LIBCMT ref: 00589837
                              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00589452
                              • _wcsncpy.LIBCMT ref: 005894C5
                              • DeleteFileW.KERNEL32(?,?), ref: 005894FB
                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00589511
                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00589522
                              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00589534
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                              • String ID:
                              • API String ID: 1500180987-0
                              • Opcode ID: 6d84283aedb63e4a35d19f3daeac437ebb446bbe1b4d663aa97da644e921ed20
                              • Instruction ID: f442c2035a573258e75c9375f82bcdc91bab61bd1a1088955602635cfed662f2
                              • Opcode Fuzzy Hash: 6d84283aedb63e4a35d19f3daeac437ebb446bbe1b4d663aa97da644e921ed20
                              • Instruction Fuzzy Hash: CBC140B1D00129AADF21EF95CC85AEEBBBDFF85314F0044A6F609E7151EB309A448F65

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00524706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,005E52F8,?,005237AE,?), ref: 00524724
                                • Part of subcall function 0054050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00527165), ref: 0054052D
                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 005271A8
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0055E8C8
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 0055E909
                              • RegCloseKey.ADVAPI32(?), ref: 0055E947
                              • _wcscat.LIBCMT ref: 0055E9A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                              • API String ID: 2673923337-2727554177
                              • Opcode ID: 58782fd547473c8750cb88e0ec71794c3f8a90d0b00283d2c6c0b40d51dc62ee
                              • Instruction ID: 1a1f0dbce327989c58ad511fb98d6dda212e155294a83afe5d35b842face27e7
                              • Opcode Fuzzy Hash: 58782fd547473c8750cb88e0ec71794c3f8a90d0b00283d2c6c0b40d51dc62ee
                              • Instruction Fuzzy Hash: C671C0755083529EC308DF65E8959ABBFF8FFA9390F40052EF5858B1A0EB70994CCB52

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00523A50
                              • LoadCursorW.USER32(00000000,00007F00), ref: 00523A5F
                              • LoadIconW.USER32(00000063), ref: 00523A76
                              • LoadIconW.USER32(000000A4), ref: 00523A88
                              • LoadIconW.USER32(000000A2), ref: 00523A9A
                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00523AC0
                              • RegisterClassExW.USER32(?), ref: 00523B16
                                • Part of subcall function 00523041: GetSysColorBrush.USER32(0000000F), ref: 00523074
                                • Part of subcall function 00523041: RegisterClassExW.USER32(00000030), ref: 0052309E
                                • Part of subcall function 00523041: RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 005230AF
                                • Part of subcall function 00523041: LoadIconW.USER32(000000A9), ref: 005230F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Load$Icon$Register$BrushClassColor$ClipboardCursorFormatImage
                              • String ID: #$0$AutoIt v3
                              • API String ID: 2880975755-4155596026
                              • Opcode ID: d1d705582325ce4c76fc443b156bc7bb66279d5f8cfe79bead3687c379863304
                              • Instruction ID: 9ea61ea91074ba10ea3309ffa618dcda17d1235152a677e923bf435c5e7911a7
                              • Opcode Fuzzy Hash: d1d705582325ce4c76fc443b156bc7bb66279d5f8cfe79bead3687c379863304
                              • Instruction Fuzzy Hash: BF217E75D00344AFEB14CFA4EC89B9D7FB0FB29715F00012AF640AA2A1E3B55548EF90

                              Control-flow Graph

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$R^
                              • API String ID: 1825951767-420430719
                              • Opcode ID: 7c52f7eccf190b1819a11b5ce72a2a0a24879c011f732b98f4a9ccb4d26bf2ce
                              • Instruction ID: e361adc1c88c348e9c35146b63894433fa0c50d8de1c8c81fa545ab3650b7f8f
                              • Opcode Fuzzy Hash: 7c52f7eccf190b1819a11b5ce72a2a0a24879c011f732b98f4a9ccb4d26bf2ce
                              • Instruction Fuzzy Hash: 0EA1307690022E9ACB15EBA0EC99AEEBF7CBF56304F440429F415B71D1EF745A08CB60

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00523074
                              • RegisterClassExW.USER32(00000030), ref: 0052309E
                              • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 005230AF
                              • LoadIconW.USER32(000000A9), ref: 005230F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Register$BrushClassClipboardColorFormatIconLoad
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 975902462-1005189915
                              • Opcode ID: 3832b5b84dc5251464c7aeac7f080bbd2cfd09fa4909a70c82a5e7c865b95771
                              • Instruction ID: 05a42980b5ea64d26479ff4a0e2bd1ad1c64f69be5d42210ed9bae3ec5bc1765
                              • Opcode Fuzzy Hash: 3832b5b84dc5251464c7aeac7f080bbd2cfd09fa4909a70c82a5e7c865b95771
                              • Instruction Fuzzy Hash: 78312A71845349AFDB50CFE4EC88A9EBFF4FB1A314F24456AE580AA2A0E3B50548DF51

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00523074
                              • RegisterClassExW.USER32(00000030), ref: 0052309E
                              • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 005230AF
                              • LoadIconW.USER32(000000A9), ref: 005230F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Register$BrushClassClipboardColorFormatIconLoad
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 975902462-1005189915
                              • Opcode ID: 76581b03285c7c21a6c443d2d9598a10fae067dfd02fa2dba97b7bf74426a36d
                              • Instruction ID: 83e433242aa836dea3ea70528477d68f9a1cf297113bf7b419ff68ce30943da9
                              • Opcode Fuzzy Hash: 76581b03285c7c21a6c443d2d9598a10fae067dfd02fa2dba97b7bf74426a36d
                              • Instruction Fuzzy Hash: DB21F7B5D01258AFDB00DFE4EC88BDDBBF4FB19704F10412AF651AA2A0E7B14548AF95

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00540162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00540193
                                • Part of subcall function 00540162: MapVirtualKeyW.USER32(00000010,00000000), ref: 0054019B
                                • Part of subcall function 00540162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 005401A6
                                • Part of subcall function 00540162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 005401B1
                                • Part of subcall function 00540162: MapVirtualKeyW.USER32(00000011,00000000), ref: 005401B9
                                • Part of subcall function 00540162: MapVirtualKeyW.USER32(00000012,00000000), ref: 005401C1
                                • Part of subcall function 005360F9: RegisterClipboardFormatW.USER32(WM_GETCONTROLNAME), ref: 00536154
                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0052F9CD
                              • OleInitialize.OLE32(00000000), ref: 0052FA4A
                              • CloseHandle.KERNEL32(00000000), ref: 005645C8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Virtual$Handle$ClipboardCloseFormatInitializeRegister
                              • String ID: <W^$\T^$%[$S^
                              • API String ID: 3094916012-4003361884
                              • Opcode ID: d08322e4586cff166b0c3da61b3e6823af856f69a7b71d47574b6af1d2a35462
                              • Instruction ID: f065399c5e3fd564b4bdf3ff836caa6e2523adab4aac3fbd5a706e8cf2bf84e6
                              • Opcode Fuzzy Hash: d08322e4586cff166b0c3da61b3e6823af856f69a7b71d47574b6af1d2a35462
                              • Instruction Fuzzy Hash: 1C81C0B0901BC58FCB8CDF39A9846197FE5FBA834E750852AD189CF2A1F7704488AF11

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 989 119e938-119e9e6 call 119c348 992 119e9ed-119ea13 call 119f848 CreateFileW 989->992 995 119ea1a-119ea2a 992->995 996 119ea15 992->996 1001 119ea2c 995->1001 1002 119ea31-119ea4b VirtualAlloc 995->1002 997 119eb65-119eb69 996->997 999 119ebab-119ebae 997->999 1000 119eb6b-119eb6f 997->1000 1003 119ebb1-119ebb8 999->1003 1004 119eb7b-119eb7f 1000->1004 1005 119eb71-119eb74 1000->1005 1001->997 1008 119ea4d 1002->1008 1009 119ea52-119ea69 ReadFile 1002->1009 1010 119ebba-119ebc5 1003->1010 1011 119ec0d-119ec22 1003->1011 1006 119eb8f-119eb93 1004->1006 1007 119eb81-119eb8b 1004->1007 1005->1004 1014 119eba3 1006->1014 1015 119eb95-119eb9f 1006->1015 1007->1006 1008->997 1016 119ea6b 1009->1016 1017 119ea70-119eab0 VirtualAlloc 1009->1017 1018 119ebc9-119ebd5 1010->1018 1019 119ebc7 1010->1019 1012 119ec32-119ec3a 1011->1012 1013 119ec24-119ec2f VirtualFree 1011->1013 1013->1012 1014->999 1015->1014 1016->997 1020 119eab2 1017->1020 1021 119eab7-119ead2 call 119fa98 1017->1021 1022 119ebe9-119ebf5 1018->1022 1023 119ebd7-119ebe7 1018->1023 1019->1011 1020->997 1029 119eadd-119eae7 1021->1029 1026 119ec02-119ec08 1022->1026 1027 119ebf7-119ec00 1022->1027 1025 119ec0b 1023->1025 1025->1003 1026->1025 1027->1025 1030 119eae9-119eb18 call 119fa98 1029->1030 1031 119eb1a-119eb2e call 119f8a8 1029->1031 1030->1029 1037 119eb30 1031->1037 1038 119eb32-119eb36 1031->1038 1037->997 1039 119eb38-119eb3c CloseHandle 1038->1039 1040 119eb42-119eb46 1038->1040 1039->1040 1041 119eb48-119eb53 VirtualFree 1040->1041 1042 119eb56-119eb5f 1040->1042 1041->1042 1042->992 1042->997
                              APIs
                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 0119EA09
                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0119EC2F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1700242548.000000000119C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0119C000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_119c000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CreateFileFreeVirtual
                              • String ID:
                              • API String ID: 204039940-0
                              • Opcode ID: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                              • Instruction ID: 478a57ad005941d6012f4176b6cbe5b6a4c66db6cb736099aec9232e6d1f0c58
                              • Opcode Fuzzy Hash: d349c2c11462b54f33c86561be68849ac3e84e681e3d8bb3fdc8e10bc75df865
                              • Instruction Fuzzy Hash: 8FA11870E01209EBDF18CFA4C898BAEBBB5BF48704F108559E212BB280D7759A41CF65

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1120 5239d5-523a45 CreateWindowExW * 2 ShowWindow * 2
                              APIs
                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00523A03
                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00523A24
                              • ShowWindow.USER32(00000000,?,?), ref: 00523A38
                              • ShowWindow.USER32(00000000,?,?), ref: 00523A41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$CreateShow
                              • String ID: AutoIt v3$edit
                              • API String ID: 1584632944-3779509399
                              • Opcode ID: 6725b50c2f59d707b9a30cbbec79dc12eee4ad75d2f110a4a5f7c6f1fd214917
                              • Instruction ID: 2c836dbe3a89cbe2e0cc2ffb8cca74e0955ceba2ca2f816a733e8f85687e76de
                              • Opcode Fuzzy Hash: 6725b50c2f59d707b9a30cbbec79dc12eee4ad75d2f110a4a5f7c6f1fd214917
                              • Instruction Fuzzy Hash: C7F03A75A002D07EEA305763AC88E7B3E7DE7D7F54B00002ABB40AA171E2610844EAB0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1473 52686a-526891 call 524ddd 1476 55e031-55e041 call 58955b 1473->1476 1477 526897-5268a5 call 524ddd 1473->1477 1481 55e046-55e048 1476->1481 1477->1476 1482 5268ab-5268b1 1477->1482 1483 55e067-55e0af call 540db6 1481->1483 1484 55e04a-55e04d call 524e4a 1481->1484 1486 5268b7-5268d9 call 526a8c 1482->1486 1487 55e052-55e061 call 5842f8 1482->1487 1492 55e0d4 1483->1492 1493 55e0b1-55e0bb 1483->1493 1484->1487 1487->1483 1497 55e0d6-55e0e9 1492->1497 1496 55e0cf-55e0d0 1493->1496 1498 55e0d2 1496->1498 1499 55e0bd-55e0cc 1496->1499 1500 55e260-55e271 call 542d55 call 524e4a 1497->1500 1501 55e0ef 1497->1501 1498->1497 1499->1496 1510 55e273-55e283 call 527616 call 525d9b 1500->1510 1503 55e0f6-55e0f9 call 527480 1501->1503 1507 55e0fe-55e120 call 525db2 call 5873e9 1503->1507 1516 55e134-55e13e call 5873d3 1507->1516 1517 55e122-55e12f 1507->1517 1526 55e288-55e2b8 call 57f7a1 call 540e2c call 542d55 call 524e4a 1510->1526 1524 55e140-55e153 1516->1524 1525 55e158-55e162 call 5873bd 1516->1525 1519 55e227-55e237 call 52750f 1517->1519 1519->1507 1528 55e23d-55e25a call 52735d 1519->1528 1524->1519 1536 55e164-55e171 1525->1536 1537 55e176-55e180 call 525e2a 1525->1537 1526->1510 1528->1500 1528->1503 1536->1519 1537->1519 1543 55e186-55e19e call 57f73d 1537->1543 1548 55e1c1-55e1c4 1543->1548 1549 55e1a0-55e1bf call 527de1 call 525904 1543->1549 1551 55e1c6-55e1e1 call 527de1 call 526839 call 525904 1548->1551 1552 55e1f2-55e1f5 1548->1552 1572 55e1e2-55e1f0 call 525db2 1549->1572 1551->1572 1554 55e215-55e218 call 58737f 1552->1554 1555 55e1f7-55e200 call 57f65e 1552->1555 1562 55e21d-55e226 call 540e2c 1554->1562 1555->1526 1565 55e206-55e210 call 540e2c 1555->1565 1562->1519 1565->1507 1572->1562
                              APIs
                                • Part of subcall function 00524DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,005E52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00524E0F
                              • _free.LIBCMT ref: 0055E263
                              • _free.LIBCMT ref: 0055E2AA
                                • Part of subcall function 00526A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00526BAD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _free$CurrentDirectoryLibraryLoad
                              • String ID: /vR$>>>AUTOIT SCRIPT<<<$Bad directive syntax error
                              • API String ID: 2861923089-1458436481
                              • Opcode ID: 61c8a95cd4a81f79fe8bd02042d9d9e3f5a6bbe02d50805ac30d9b65e9f06942
                              • Instruction ID: 2ec3a1cb2447a59c5bb882ebcb85e53778d706332760998538bad39d0c6c0898
                              • Opcode Fuzzy Hash: 61c8a95cd4a81f79fe8bd02042d9d9e3f5a6bbe02d50805ac30d9b65e9f06942
                              • Instruction Fuzzy Hash: BA91617190022A9FCF08EFA4DC569EDBFB8FF49315F10442AF815AB2A1DB709A55CB50

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1577 119e6f8-119e83b call 119c348 call 119e5e8 CreateFileW 1584 119e83d 1577->1584 1585 119e842-119e852 1577->1585 1586 119e8f2-119e8f7 1584->1586 1588 119e859-119e873 VirtualAlloc 1585->1588 1589 119e854 1585->1589 1590 119e875 1588->1590 1591 119e877-119e88e ReadFile 1588->1591 1589->1586 1590->1586 1592 119e890 1591->1592 1593 119e892-119e8cc call 119e628 call 119d5e8 1591->1593 1592->1586 1598 119e8e8-119e8f0 ExitProcess 1593->1598 1599 119e8ce-119e8e3 call 119e678 1593->1599 1598->1586 1599->1598
                              APIs
                                • Part of subcall function 0119E5E8: Sleep.KERNELBASE(000001F4), ref: 0119E5F9
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 0119E831
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1700242548.000000000119C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0119C000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_119c000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CreateFileSleep
                              • String ID: J8SN1F4QDMCUT2FEK82TJD
                              • API String ID: 2694422964-3235976714
                              • Opcode ID: 58f2a68ab7b95a7b218c261ff4c8884ccfa52f38d0abba6e7ddd785d25bd4e27
                              • Instruction ID: ec6ae77e2c8708fecccf25f7ee309bdc6809ac1fce9bd61f33fcea2fa1a37f92
                              • Opcode Fuzzy Hash: 58f2a68ab7b95a7b218c261ff4c8884ccfa52f38d0abba6e7ddd785d25bd4e27
                              • Instruction Fuzzy Hash: 2251A330D05358EAEF15DBE4C854BEEBBB4AF19304F004199E258BB2C1D7B95B44CBA6
                              APIs
                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 0055D3D7
                                • Part of subcall function 00527BCC: _memmove.LIBCMT ref: 00527C06
                              • _memset.LIBCMT ref: 005240FC
                              • _wcscpy.LIBCMT ref: 00524150
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00524160
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                              • String ID: Line:
                              • API String ID: 3942752672-1585850449
                              • Opcode ID: 0e1075d4062cbc2b1ff36e6d7b7361cebba10c0a1f33c9528041f11635870d7f
                              • Instruction ID: 6dcbd386474e72b8c14695a9284623c758df859f6e34dd178589bd983db7c179
                              • Opcode Fuzzy Hash: 0e1075d4062cbc2b1ff36e6d7b7361cebba10c0a1f33c9528041f11635870d7f
                              • Instruction Fuzzy Hash: 8831C4710087566FD724EB60EC4AFDB7FD8BF96304F10491AF685960E1EB709648CB92
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                              • String ID:
                              • API String ID: 1559183368-0
                              • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                              • Instruction ID: e6000b6c37e23a46ce169529d83a71c3d2e084557d930dc05575584f48bac555
                              • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                              • Instruction Fuzzy Hash: 2051B670A00B05DBCF249FA9D8446FE7FB6BF41329F248729F8259A2D2E7709D549B40
                              APIs
                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,005235A1,SwapMouseButtons,00000004,?), ref: 005235D4
                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,005235A1,SwapMouseButtons,00000004,?,?,?,?,00522754), ref: 005235F5
                              • RegCloseKey.KERNELBASE(00000000,?,?,005235A1,SwapMouseButtons,00000004,?,?,?,?,00522754), ref: 00523617
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID: Control Panel\Mouse
                              • API String ID: 3677997916-824357125
                              • Opcode ID: 9cbd39052419e18658d87617f7f0be5b84bac753c38cf236e10d7dac92e8d854
                              • Instruction ID: dd9c578246d5b9e72abc785a1326f61ac2efe2ac44691957df9ae8c370a821ab
                              • Opcode Fuzzy Hash: 9cbd39052419e18658d87617f7f0be5b84bac753c38cf236e10d7dac92e8d854
                              • Instruction Fuzzy Hash: 2B114871610228BFDB208FA4EC44AAEBBBCFF06740F014469E805D7250E271AE44AB60
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 0119DE15
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0119DE39
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0119DE5B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1700242548.000000000119C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0119C000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_119c000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: e3f14b9100784c2d13b4d96e4da997e342e741b63af52aad6d222721779d43e7
                              • Instruction ID: fc06cc855e8570ef8ec72e99d9c2a3eef7beac430cb5f56239b2c4f6848982d8
                              • Opcode Fuzzy Hash: e3f14b9100784c2d13b4d96e4da997e342e741b63af52aad6d222721779d43e7
                              • Instruction Fuzzy Hash: 8462FD70A14258DBEB28CFA4C850BDEB776EF58300F1091A9D11DEB390E7759E81CB59
                              APIs
                                • Part of subcall function 00524EE5: _fseek.LIBCMT ref: 00524EFD
                                • Part of subcall function 00589734: _wcscmp.LIBCMT ref: 00589824
                                • Part of subcall function 00589734: _wcscmp.LIBCMT ref: 00589837
                              • _free.LIBCMT ref: 005896A2
                              • _free.LIBCMT ref: 005896A9
                              • _free.LIBCMT ref: 00589714
                                • Part of subcall function 00542D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00549A24), ref: 00542D69
                                • Part of subcall function 00542D55: GetLastError.KERNEL32(00000000,?,00549A24), ref: 00542D7B
                              • _free.LIBCMT ref: 0058971C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                              • String ID:
                              • API String ID: 1552873950-0
                              • Opcode ID: 4a2872fe10592e1d84cc1262fcb1ccf713934ef89923d88bffb920594bd4d040
                              • Instruction ID: e2bdc7549961a7f0a4f8e2a9db3d1c9cfec97ce2209b93f424fd78cc36548baa
                              • Opcode Fuzzy Hash: 4a2872fe10592e1d84cc1262fcb1ccf713934ef89923d88bffb920594bd4d040
                              • Instruction Fuzzy Hash: BB515EB1D04219ABDF249F64DC85AAEBB79FF89300F14449EF609A3341DB715A80CF58
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                              • String ID:
                              • API String ID: 2782032738-0
                              • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                              • Instruction ID: 87481ade180fe825c11ea3adbff061da60a1d936f77d12349e28c62f74066b83
                              • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                              • Instruction Fuzzy Hash: 5E41D374A407469BDB18CF69C884AEE7FA5FF81368B24853DE815C7640EB70DD428F40
                              APIs
                              • _memset.LIBCMT ref: 005244CF
                                • Part of subcall function 0052407C: _memset.LIBCMT ref: 005240FC
                                • Part of subcall function 0052407C: _wcscpy.LIBCMT ref: 00524150
                                • Part of subcall function 0052407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00524160
                              • KillTimer.USER32(?,00000001,?,?), ref: 00524524
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00524533
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0055D4B9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                              • String ID:
                              • API String ID: 1378193009-0
                              • Opcode ID: 19025e88b152ad0cae4533195af282b43781dffb8e46b719e298385e7bdcaa0a
                              • Instruction ID: 475f96e1543448fdf3932e87d75e04423ab5ed463116ad2000545d0a1e4bcff3
                              • Opcode Fuzzy Hash: 19025e88b152ad0cae4533195af282b43781dffb8e46b719e298385e7bdcaa0a
                              • Instruction Fuzzy Hash: 4921F5759047949FEB32CB249859BE6BFECBF16309F04049EE7CA5A181C3B42988DB51
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: AU3!P/[$EA06
                              • API String ID: 4104443479-1006748828
                              • Opcode ID: 61f726128085ef999bc9ba229805427cc8ae0f588bd65ecbbd26ee2313abf234
                              • Instruction ID: 78562c308641064c7eb9a476f3a1e6d36494aed9ab33db3c04148fb6f1c63193
                              • Opcode Fuzzy Hash: 61f726128085ef999bc9ba229805427cc8ae0f588bd65ecbbd26ee2313abf234
                              • Instruction Fuzzy Hash: C2418E32A0017957DF219B64F8557BE7F65BF87300F684465EC82A72C6D6209D448FA1
                              APIs
                              • _memset.LIBCMT ref: 0055EA39
                              • 7523D0D0.COMDLG32(?), ref: 0055EA83
                                • Part of subcall function 00524750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00524743,?,?,005237AE,?), ref: 00524770
                                • Part of subcall function 00540791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 005407B0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: NamePath$7523FullLong_memset
                              • String ID: X
                              • API String ID: 3285060876-3081909835
                              • Opcode ID: 3c728887cd587245830f67b5fa3fb5aa533a2833b84e5ab6502b1885b7754c3c
                              • Instruction ID: e2629ff157f25789c73e7c52ce2b5515f75642e3b9bb1f871777bec4678fadf8
                              • Opcode Fuzzy Hash: 3c728887cd587245830f67b5fa3fb5aa533a2833b84e5ab6502b1885b7754c3c
                              • Instruction Fuzzy Hash: B521C631A002599BCB11DF98D849BEE7FF8BF49315F00405AE908A7281DBB4598D8F91
                              APIs
                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00523C14,005E52F8,?,?,?), ref: 0053096E
                                • Part of subcall function 00527BCC: _memmove.LIBCMT ref: 00527C06
                              • _wcscat.LIBCMT ref: 00564CB7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: FullNamePath_memmove_wcscat
                              • String ID: S^
                              • API String ID: 257928180-4185188088
                              • Opcode ID: 27212091fc82cba3ece1cb65efb0b13fb66c84a8b70b78fe7a98bb21252b3370
                              • Instruction ID: b46dd259d554a53b85278a9a2a0e62200993ddd51b286dc4bf0b9797f0d3312f
                              • Opcode Fuzzy Hash: 27212091fc82cba3ece1cb65efb0b13fb66c84a8b70b78fe7a98bb21252b3370
                              • Instruction Fuzzy Hash: 2C11E532A0131A9BCB00EBA0D809FCD7FF8BF4C350F0048A6B984D32C1EAB096885B10
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __fread_nolock_memmove
                              • String ID: EA06
                              • API String ID: 1988441806-3962188686
                              • Opcode ID: 576e8529372d389ab2d849daea88eadf9ac1acc35de4bf440b4ab95782d4e6ac
                              • Instruction ID: 9e130e65738853b13ee6ec0275086160b41686e9bd7ce02d6e40f93f10e230e9
                              • Opcode Fuzzy Hash: 576e8529372d389ab2d849daea88eadf9ac1acc35de4bf440b4ab95782d4e6ac
                              • Instruction Fuzzy Hash: 7701F9718042187FDB28DBA8C81AEFE7FF8EB11301F00459BF552D2281E874A6148760
                              APIs
                                • Part of subcall function 0054571C: __FF_MSGBANNER.LIBCMT ref: 00545733
                                • Part of subcall function 0054571C: __NMSG_WRITE.LIBCMT ref: 0054573A
                                • Part of subcall function 0054571C: RtlAllocateHeap.NTDLL(00FA0000,00000000,00000001), ref: 0054575F
                              • std::exception::exception.LIBCMT ref: 00540DEC
                              • __CxxThrowException@8.LIBCMT ref: 00540E01
                                • Part of subcall function 0054859B: RaiseException.KERNEL32(?,?,00000000,005D9E78,?,00000001,?,?,?,00540E06,00000000,005D9E78,00529E8C,00000001), ref: 005485F0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                              • String ID: bad allocation
                              • API String ID: 3902256705-2104205924
                              • Opcode ID: b677f63961eed275b2d3447339a0a529b189cc38d28766a70711ac238deed934
                              • Instruction ID: 883f57efb808192da9ae65c795edeb3564a9f329afe21d129969c22bd0bc438f
                              • Opcode Fuzzy Hash: b677f63961eed275b2d3447339a0a529b189cc38d28766a70711ac238deed934
                              • Instruction Fuzzy Hash: 7CF0A93590021A66CB14BA98EC095EE7FECFF41359F10082AF91596291DF709A55C5E1
                              APIs
                              • GetTempPathW.KERNEL32(00000104,?), ref: 005898F8
                              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 0058990F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Temp$FileNamePath
                              • String ID: aut
                              • API String ID: 3285503233-3010740371
                              • Opcode ID: 932107abb558802a4e4b171acdad2587e86184f3b5fad4ce76628a076ddc9263
                              • Instruction ID: f0787e1201dc45722c61218ae871fcc4440f712e2c624e732ecb72afa4d6e8d9
                              • Opcode Fuzzy Hash: 932107abb558802a4e4b171acdad2587e86184f3b5fad4ce76628a076ddc9263
                              • Instruction Fuzzy Hash: B0D05E7954030DABDB609BE4DC0EFEA7B3CEB14701F0006B2BB94911A1EAB095989B91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0a88af59167f200c59dbe613c04f447cd93ea941063c82400b502c26c4c20dda
                              • Instruction ID: 9f5697681199a82ebc4eb57655c2c6f2a00d1ebebceb66f1c23f674bf57013bd
                              • Opcode Fuzzy Hash: 0a88af59167f200c59dbe613c04f447cd93ea941063c82400b502c26c4c20dda
                              • Instruction Fuzzy Hash: BEF103716083419FCB14DF28C484A6ABBE5FF89314F54896EF8999B292D730E945CF82
                              APIs
                              • _memset.LIBCMT ref: 00524370
                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00524415
                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00524432
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: IconNotifyShell_$_memset
                              • String ID:
                              • API String ID: 1505330794-0
                              • Opcode ID: 1120577a4da814c4a520e6b7878a112be63b3053695eace586ea54323a0bacf6
                              • Instruction ID: c7b300913956850c2d125a7609377505bd91946ae48a62e3d2e73313cd1e5168
                              • Opcode Fuzzy Hash: 1120577a4da814c4a520e6b7878a112be63b3053695eace586ea54323a0bacf6
                              • Instruction Fuzzy Hash: CB3150705047118FD725DF64E88469BBFF8FF69309F00092EE6DA86291E771A948CB92
                              APIs
                              • __FF_MSGBANNER.LIBCMT ref: 00545733
                                • Part of subcall function 0054A16B: __NMSG_WRITE.LIBCMT ref: 0054A192
                                • Part of subcall function 0054A16B: __NMSG_WRITE.LIBCMT ref: 0054A19C
                              • __NMSG_WRITE.LIBCMT ref: 0054573A
                                • Part of subcall function 0054A1C8: GetModuleFileNameW.KERNEL32(00000000,005E33BA,00000104,00000000,00000001,00000000), ref: 0054A25A
                                • Part of subcall function 0054A1C8: ___crtMessageBoxW.LIBCMT ref: 0054A308
                                • Part of subcall function 0054309F: ___crtCorExitProcess.LIBCMT ref: 005430A5
                                • Part of subcall function 0054309F: ExitProcess.KERNEL32 ref: 005430AE
                                • Part of subcall function 00548B28: __getptd_noexit.LIBCMT ref: 00548B28
                              • RtlAllocateHeap.NTDLL(00FA0000,00000000,00000001), ref: 0054575F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                              • String ID:
                              • API String ID: 1372826849-0
                              • Opcode ID: ded488e9bd239d86b253b9914eea71b4306ba9c92c6ca94d02810c6285e165d6
                              • Instruction ID: 89a37cc971656014a263fcabaf39cb5742839223a6fca6e8e7475f631e211f0e
                              • Opcode Fuzzy Hash: ded488e9bd239d86b253b9914eea71b4306ba9c92c6ca94d02810c6285e165d6
                              • Instruction Fuzzy Hash: F701C035240A02DBE6142B34EC8AAEE7F48FB923A9B100935F5459B192EF709C009661
                              APIs
                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00589548,?,?,?,?,?,00000004), ref: 005898BB
                              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00589548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 005898D1
                              • CloseHandle.KERNEL32(00000000,?,00589548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 005898D8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: File$CloseCreateHandleTime
                              • String ID:
                              • API String ID: 3397143404-0
                              • Opcode ID: 7059cc5e483a7612e2144cb33aaa232476cd5e1026184d522c8f931a9cd77448
                              • Instruction ID: 4cc4ecd8e0ae30f4e637af7fa9f23facc7ee94680a3ba243bdb125dab168b7c4
                              • Opcode Fuzzy Hash: 7059cc5e483a7612e2144cb33aaa232476cd5e1026184d522c8f931a9cd77448
                              • Instruction Fuzzy Hash: E0E08632240214BBDB312B94EC09FDA7F19AB17761F144121FB54790E087B11515A798
                              APIs
                              • _free.LIBCMT ref: 00588D1B
                                • Part of subcall function 00542D55: RtlFreeHeap.NTDLL(00000000,00000000,?,00549A24), ref: 00542D69
                                • Part of subcall function 00542D55: GetLastError.KERNEL32(00000000,?,00549A24), ref: 00542D7B
                              • _free.LIBCMT ref: 00588D2C
                              • _free.LIBCMT ref: 00588D3E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: e572bb3280820806cd63a499e0b551fb9ad7511d2bd2374f1c7be07920dd6c79
                              • Instruction ID: 331674ddec1d294179db5e8a9e74b4860a5821e29cfcda55e4dae57ca0473e52
                              • Opcode Fuzzy Hash: e572bb3280820806cd63a499e0b551fb9ad7511d2bd2374f1c7be07920dd6c79
                              • Instruction Fuzzy Hash: 9FE012B1A0261246CB24B578A944AE31BDCAF98396F94091DB80DE7186DE64F8838224
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID: CALL
                              • API String ID: 0-4196123274
                              • Opcode ID: e70244bf7ec745a6fcc1dcfd077e52f166095d443eb8e52cc744de9981778340
                              • Instruction ID: 7f3db9b253b94e39989627bce38ae96f2a9f2254fa96c1360af21dcd434165db
                              • Opcode Fuzzy Hash: e70244bf7ec745a6fcc1dcfd077e52f166095d443eb8e52cc744de9981778340
                              • Instruction Fuzzy Hash: C1226870508361DFDB24DF14D494A6ABFE1BF86304F14896DE88A9B3A2D731EC45DB82
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 76b9c10d9e16fe5d043c0d2c81e9edef2b37ded06f51e92105b2be256def782e
                              • Instruction ID: 85f5f153ead198109ad4beb41cd1fbf2f3dfcdf93d731acd6ae8d02d7f8ddc06
                              • Opcode Fuzzy Hash: 76b9c10d9e16fe5d043c0d2c81e9edef2b37ded06f51e92105b2be256def782e
                              • Instruction Fuzzy Hash: 6141B9719082099BCB10FFA4D8899AABFA8FF8D304F344859E585A7381DB75DC05DB60
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: aa52f996f6a1e8cebf2e93e85435818c4b1739226e09e342898e130c21d93d86
                              • Instruction ID: 3916ca08aa276afefacdec531e269d29db22cf7e6141a36a5f4ec66a29cb77ac
                              • Opcode Fuzzy Hash: aa52f996f6a1e8cebf2e93e85435818c4b1739226e09e342898e130c21d93d86
                              • Instruction Fuzzy Hash: C83184B260461AAFC704DF68D8D1D69BBA9FF493207158629E519CB3D1EB30E960CB90
                              APIs
                              • 745EC8D0.UXTHEME ref: 00524834
                                • Part of subcall function 0054336C: __lock.LIBCMT ref: 00543372
                                • Part of subcall function 0054336C: RtlDecodePointer.NTDLL(00000001), ref: 0054337E
                                • Part of subcall function 0054336C: RtlEncodePointer.NTDLL(?), ref: 00543389
                                • Part of subcall function 005248FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00524915
                                • Part of subcall function 005248FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0052492A
                                • Part of subcall function 00523B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00523B68
                                • Part of subcall function 00523B3A: IsDebuggerPresent.KERNEL32 ref: 00523B7A
                                • Part of subcall function 00523B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,005E52F8,005E52E0,?,?), ref: 00523BEB
                                • Part of subcall function 00523B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00523C6F
                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00524874
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: InfoParametersSystem$CurrentDirectoryPointer$DebuggerDecodeEncodeFullNamePathPresent__lock
                              • String ID:
                              • API String ID: 2688871447-0
                              • Opcode ID: 1d66d40b93f2a26054d64e50cb60b41b01020ec74a24b3a97b7a9d9f6d9ffcd4
                              • Instruction ID: e019346be97fffd926fe972edf3ee813fe987f7add3c3fa3b63e20446b8dd7e2
                              • Opcode Fuzzy Hash: 1d66d40b93f2a26054d64e50cb60b41b01020ec74a24b3a97b7a9d9f6d9ffcd4
                              • Instruction Fuzzy Hash: C4118E729043529BC704DF68E88990ABFE8FFAA754F10491AF1848B2B1EB709548DB91
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __lock_file_memset
                              • String ID:
                              • API String ID: 26237723-0
                              • Opcode ID: 09f11003d853e939440af1767ed4f14148c906e4d929446d76cbd43653f2d481
                              • Instruction ID: db9219583bb17a70e508500d25b91330ddb36961b1f3996df203d9189133d9eb
                              • Opcode Fuzzy Hash: 09f11003d853e939440af1767ed4f14148c906e4d929446d76cbd43653f2d481
                              • Instruction Fuzzy Hash: FA01A771C01A0AEBCF12AFA89C0A4EE7F61BFD2369F554115F8141A192EB318A51EF91
                              APIs
                                • Part of subcall function 00548B28: __getptd_noexit.LIBCMT ref: 00548B28
                              • __lock_file.LIBCMT ref: 005453EB
                                • Part of subcall function 00546C11: __lock.LIBCMT ref: 00546C34
                              • __fclose_nolock.LIBCMT ref: 005453F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                              • String ID:
                              • API String ID: 2800547568-0
                              • Opcode ID: 770a77ee7fbd95202b08b2433ca7d7e34973741f97dceca3c00e85507caf3561
                              • Instruction ID: 8c092e269f7f2cde224d2cf63e0f6b101d73820642275fa688b2f7f8439934bb
                              • Opcode Fuzzy Hash: 770a77ee7fbd95202b08b2433ca7d7e34973741f97dceca3c00e85507caf3561
                              • Instruction Fuzzy Hash: C1F09631801A069BDB106F65980D7ED6EA07F8137CF248505A464AB1C2DBBC4945AB52
                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 0119DE15
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 0119DE39
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 0119DE5B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1700242548.000000000119C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0119C000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_119c000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                              • Instruction ID: cedc5b0e8087e238d32591a8e29f6decba3e733ef189ad950fdf577eb0ff11ff
                              • Opcode Fuzzy Hash: 1e5ff81ed8f871418fabb2f1fb9f15c50bab29dc79b391b745a61db8bf218849
                              • Instruction Fuzzy Hash: BA12DE24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F81CF5A
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ProtectVirtual
                              • String ID:
                              • API String ID: 544645111-0
                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction ID: f4d7ae171862489cddc956dbc40128c953cfd46ca124b96e64f4c0439facaa78
                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction Fuzzy Hash: 0331C370A00105DBC718DF58D4C49A9FBB6FB99308B7496A5E90ACB391D631EDC1DBC0
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: a1690d0e79aef1bed43ad2e5df10fc1a4bc946c3d27e305e8c2ab8800debe9bb
                              • Instruction ID: 4f36c46faf0482d058b10fb77bbc2b6adf42b179e8c8f5fd4a338504c1509e0a
                              • Opcode Fuzzy Hash: a1690d0e79aef1bed43ad2e5df10fc1a4bc946c3d27e305e8c2ab8800debe9bb
                              • Instruction Fuzzy Hash: 9F41F5746043518FDB25DF14D498B1ABFE1BF85318F1988ACE9998B3A2C731EC45CB52
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: d98f48875766fa5f8f916d0bfb51603f6c320fcf346c989be66f975dc5ef0650
                              • Instruction ID: 07ecaf58ae070c1de534fd8c75e47f86fe833d945e4ec82be977f972bca3cf94
                              • Opcode Fuzzy Hash: d98f48875766fa5f8f916d0bfb51603f6c320fcf346c989be66f975dc5ef0650
                              • Instruction Fuzzy Hash: 2C212772A04A19EBDB248F11F8526697FB8FF64351F21886FE886C5090EB30C598E705
                              APIs
                                • Part of subcall function 00524BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00524BEF
                                • Part of subcall function 0054525B: __wfsopen.LIBCMT ref: 00545266
                              • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,005E52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00524E0F
                                • Part of subcall function 00524B6A: FreeLibrary.KERNEL32(00000000), ref: 00524BA4
                                • Part of subcall function 00524C70: _memmove.LIBCMT ref: 00524CBA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Library$Free$Load__wfsopen_memmove
                              • String ID:
                              • API String ID: 1396898556-0
                              • Opcode ID: 020df9d337a3a9dfdaba05c677acc09fe7e52af5763ca98efee2861accfc28cf
                              • Instruction ID: 05e9e027e360925c301dc050bb3f57b140df191d6225c267df40aa8ec7eca45b
                              • Opcode Fuzzy Hash: 020df9d337a3a9dfdaba05c677acc09fe7e52af5763ca98efee2861accfc28cf
                              • Instruction Fuzzy Hash: B811C432600216ABDF20AF70D81AFAD7FA9BFC6710F108829F941A71C1EA7199049F61
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: f433c035dea3117629f23eb6d011c5942b507c358b482ad20318e6c16b42ce1e
                              • Instruction ID: 3f8e419c4773d9ec3298bcb2d43558e661752d37d5c80b93efcc989223c5dae6
                              • Opcode Fuzzy Hash: f433c035dea3117629f23eb6d011c5942b507c358b482ad20318e6c16b42ce1e
                              • Instruction Fuzzy Hash: 04214474508312DFCB14DF64D444A1ABFE0BF89314F04896CF98A577A2D731E819CB92
                              APIs
                              • __lock_file.LIBCMT ref: 005448A6
                                • Part of subcall function 00548B28: __getptd_noexit.LIBCMT ref: 00548B28
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __getptd_noexit__lock_file
                              • String ID:
                              • API String ID: 2597487223-0
                              • Opcode ID: bc0a4ea3404a5ae87b155893caa4576e32ad90ef9c0b61ac7cb51a134f36484e
                              • Instruction ID: d948834533692ddc3a564b7e0c8e84ab5ada502cd1cb48150e6acd8288ac1917
                              • Opcode Fuzzy Hash: bc0a4ea3404a5ae87b155893caa4576e32ad90ef9c0b61ac7cb51a134f36484e
                              • Instruction Fuzzy Hash: 33F0C23194160AEBDF11AFB48C0E7EE3EA0FF4132DF158414F424AA192CB788951DF51
                              APIs
                              • FreeLibrary.KERNEL32(?,?,005E52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00524E7E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: 2fa5459cc16802dd68f721574cab18092ad623459814db5feef107bcc1c19ebd
                              • Instruction ID: 3e93b1b26ee3d31f5064cbc70d7bb61bc108327c7aff8f9557569272c24fd8ad
                              • Opcode Fuzzy Hash: 2fa5459cc16802dd68f721574cab18092ad623459814db5feef107bcc1c19ebd
                              • Instruction Fuzzy Hash: 1BF03971501722CFEB349F64E494813BFE9BF563293218E3EE2D682660C7329884DF41
                              APIs
                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 005407B0
                                • Part of subcall function 00527BCC: _memmove.LIBCMT ref: 00527C06
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: LongNamePath_memmove
                              • String ID:
                              • API String ID: 2514874351-0
                              • Opcode ID: 8c08d9029d7bc7ac3015306dd52bb77f298b42b08ce54c26b1dcea560746b191
                              • Instruction ID: 508e96d1348ee47a42ea61287621954505b371e6bba7166e1464edd29c95de26
                              • Opcode Fuzzy Hash: 8c08d9029d7bc7ac3015306dd52bb77f298b42b08ce54c26b1dcea560746b191
                              • Instruction Fuzzy Hash: 4BE0CD379051295BC720D6989C09FEA7BEDEFCD7A1F0441B6FC0CD7254D9609C8486D0
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __fread_nolock
                              • String ID:
                              • API String ID: 2638373210-0
                              • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                              • Instruction ID: 891c9a229ce65b0b7d0c0ec2d24ac35a1af4d20d5cae097693d601790036c776
                              • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                              • Instruction Fuzzy Hash: 6FE092B0104B045BD7389A24D800BF377E5FB05304F04081DF6AA93242EB6278458759
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __wfsopen
                              • String ID:
                              • API String ID: 197181222-0
                              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                              • Instruction ID: bf07238608b3fb92dd844f405f14603f5af31aea0aea64456857a7b497053fc3
                              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                              • Instruction Fuzzy Hash: FBB0927A44420C77CE012A92EC02A893F19AB81768F408021FB0C18162A6B3A6649A89
                              APIs
                              • Sleep.KERNELBASE(000001F4), ref: 0119E5F9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1700242548.000000000119C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0119C000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_119c000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction ID: b6146f0dea53386bb0391d4ddcb0e1b998a3897f700982ab85eb5713efe04e80
                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction Fuzzy Hash: AAE0E67594110DDFDB00DFB4D54969D7BB4FF05301F100161FD01D2281D7309D508A72
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                              • NtdllDialogWndProc_W.NTDLL(?,0000004E,?,?,?,?,?,?), ref: 005ACB37
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 005ACB95
                              • GetWindowLongW.USER32(?,000000F0), ref: 005ACBD6
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 005ACC00
                              • SendMessageW.USER32 ref: 005ACC29
                              • _wcsncpy.LIBCMT ref: 005ACC95
                              • GetKeyState.USER32(00000011), ref: 005ACCB6
                              • GetKeyState.USER32(00000009), ref: 005ACCC3
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 005ACCD9
                              • GetKeyState.USER32(00000010), ref: 005ACCE3
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 005ACD0C
                              • SendMessageW.USER32 ref: 005ACD33
                              • SendMessageW.USER32(?,00001030,?,005AB348), ref: 005ACE37
                              • SetCapture.USER32(?), ref: 005ACE69
                              • ClientToScreen.USER32(?,?), ref: 005ACECE
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 005ACEF5
                              • ReleaseCapture.USER32 ref: 005ACF00
                              • GetCursorPos.USER32(?), ref: 005ACF3A
                              • ScreenToClient.USER32(?,?), ref: 005ACF47
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 005ACFA3
                              • SendMessageW.USER32 ref: 005ACFD1
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 005AD00E
                              • SendMessageW.USER32 ref: 005AD03D
                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 005AD05E
                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 005AD06D
                              • GetCursorPos.USER32(?), ref: 005AD08D
                              • ScreenToClient.USER32(?,?), ref: 005AD09A
                              • GetParent.USER32(?), ref: 005AD0BA
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 005AD123
                              • SendMessageW.USER32 ref: 005AD154
                              • ClientToScreen.USER32(?,?), ref: 005AD1B2
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 005AD1E2
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 005AD20C
                              • SendMessageW.USER32 ref: 005AD22F
                              • ClientToScreen.USER32(?,?), ref: 005AD281
                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 005AD2B5
                                • Part of subcall function 005225DB: GetWindowLongW.USER32(?,000000EB), ref: 005225EC
                              • GetWindowLongW.USER32(?,000000F0), ref: 005AD351
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$ClientScreen$LongWindow$State$CaptureCursorMenuPopupTrack$DialogInvalidateNtdllParentProc_RectRelease_wcsncpy
                              • String ID: @GUI_DRAGID$F$pb^
                              • API String ID: 302779176-2394457914
                              • Opcode ID: 52894b8b4f14e52673f2018deb299b2999e7ccfe6fecc3a5428d72f4efcc1c3e
                              • Instruction ID: e4df50be49c511fca55a9234a8a27501ef128652cfadf5dc26881f5f7ab91805
                              • Opcode Fuzzy Hash: 52894b8b4f14e52673f2018deb299b2999e7ccfe6fecc3a5428d72f4efcc1c3e
                              • Instruction Fuzzy Hash: 7742CF34204345AFDB24DF64D888AAEBFE5FF4A310F540919F5A6872B0D731D854EBA2
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memmove$_memset
                              • String ID: ]]$3cS$DEFINE$P\]$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_S
                              • API String ID: 1357608183-308182256
                              • Opcode ID: 87f686ddd100135ba2ed537c899b19ab877d38dd4e382b767db4eb04ba95f4f4
                              • Instruction ID: dde3f3f2fd47376fcba4c85229d47ee4d0d974edfd4ea486a97c9605e267f7d3
                              • Opcode Fuzzy Hash: 87f686ddd100135ba2ed537c899b19ab877d38dd4e382b767db4eb04ba95f4f4
                              • Instruction Fuzzy Hash: 9693A575E00219DFDB24CF58D881BADBBB1FF48710F24856AE949AB381E7709D81EB50
                              APIs
                              • GetForegroundWindow.USER32(00000000,?), ref: 005248DF
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0055D665
                              • IsIconic.USER32(?), ref: 0055D66E
                              • ShowWindow.USER32(?,00000009), ref: 0055D67B
                              • SetForegroundWindow.USER32(?), ref: 0055D685
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0055D69B
                              • GetCurrentThreadId.KERNEL32 ref: 0055D6A2
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0055D6AE
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0055D6BF
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 0055D6C7
                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 0055D6CF
                              • SetForegroundWindow.USER32(?), ref: 0055D6D2
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0055D6E7
                              • keybd_event.USER32(00000012,00000000), ref: 0055D6F2
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0055D6FC
                              • keybd_event.USER32(00000012,00000000), ref: 0055D701
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0055D70A
                              • keybd_event.USER32(00000012,00000000), ref: 0055D70F
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 0055D719
                              • keybd_event.USER32(00000012,00000000), ref: 0055D71E
                              • SetForegroundWindow.USER32(?), ref: 0055D721
                              • AttachThreadInput.USER32(?,?,00000000), ref: 0055D748
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                              • String ID: Shell_TrayWnd
                              • API String ID: 4125248594-2988720461
                              • Opcode ID: 1f4d615890844f6954dc3de557504e31a4bcfe5799029c6a6d5106197b69c33f
                              • Instruction ID: 8ecc46a5b30e50acce1a2803aa29dc7af8ab4f02ddaf566afa59490536c9b686
                              • Opcode Fuzzy Hash: 1f4d615890844f6954dc3de557504e31a4bcfe5799029c6a6d5106197b69c33f
                              • Instruction Fuzzy Hash: 94319272A40318BBEB306FA19C49F7F3E6CEB59B51F104026FE04EA1D1C6B05905ABB1
                              APIs
                                • Part of subcall function 005787E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0057882B
                                • Part of subcall function 005787E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00578858
                                • Part of subcall function 005787E1: GetLastError.KERNEL32 ref: 00578865
                              • _memset.LIBCMT ref: 00578353
                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 005783A5
                              • CloseHandle.KERNEL32(?), ref: 005783B6
                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 005783CD
                              • GetProcessWindowStation.USER32 ref: 005783E6
                              • SetProcessWindowStation.USER32(00000000), ref: 005783F0
                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 0057840A
                                • Part of subcall function 005781CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00578309), ref: 005781E0
                                • Part of subcall function 005781CB: CloseHandle.KERNEL32(?,?,00578309), ref: 005781F2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                              • String ID: $default$winsta0
                              • API String ID: 2063423040-1027155976
                              • Opcode ID: 6bc2bb5f99456ffa2691db9e79f6f342ff9b07d90d12b5655d42ebceed6cfb55
                              • Instruction ID: becd5251893948b30c1fcbd0bcf2e97753b3afc4b1299e015e1a785cfd4f7da8
                              • Opcode Fuzzy Hash: 6bc2bb5f99456ffa2691db9e79f6f342ff9b07d90d12b5655d42ebceed6cfb55
                              • Instruction Fuzzy Hash: 3C814971940209BFDF119FA4EC49AFE7FB9FF08304F148169F918A6261DB318A14EB60
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 0058C78D
                              • FindClose.KERNEL32(00000000), ref: 0058C7E1
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0058C806
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 0058C81D
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 0058C844
                              • __swprintf.LIBCMT ref: 0058C890
                              • __swprintf.LIBCMT ref: 0058C8D3
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                              • __swprintf.LIBCMT ref: 0058C927
                                • Part of subcall function 00543698: __woutput_l.LIBCMT ref: 005436F1
                              • __swprintf.LIBCMT ref: 0058C975
                                • Part of subcall function 00543698: __flsbuf.LIBCMT ref: 00543713
                                • Part of subcall function 00543698: __flsbuf.LIBCMT ref: 0054372B
                              • __swprintf.LIBCMT ref: 0058C9C4
                              • __swprintf.LIBCMT ref: 0058CA13
                              • __swprintf.LIBCMT ref: 0058CA62
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                              • API String ID: 3953360268-2428617273
                              • Opcode ID: 4a8e420d10d740563ee36a04cac34492b1ae77f908c61cedc7975957101fd2a1
                              • Instruction ID: 57d145424629417fd9e231eccabdedbe5ded58d370543aa9d7986739ace59f7f
                              • Opcode Fuzzy Hash: 4a8e420d10d740563ee36a04cac34492b1ae77f908c61cedc7975957101fd2a1
                              • Instruction Fuzzy Hash: FAA120B2408316ABC714EF94D889DAFBBECFFD5704F400919F58596291EB30DA48CB62
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 0058EFB6
                              • _wcscmp.LIBCMT ref: 0058EFCB
                              • _wcscmp.LIBCMT ref: 0058EFE2
                              • GetFileAttributesW.KERNEL32(?), ref: 0058EFF4
                              • SetFileAttributesW.KERNEL32(?,?), ref: 0058F00E
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0058F026
                              • FindClose.KERNEL32(00000000), ref: 0058F031
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 0058F04D
                              • _wcscmp.LIBCMT ref: 0058F074
                              • _wcscmp.LIBCMT ref: 0058F08B
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0058F09D
                              • SetCurrentDirectoryW.KERNEL32(005D8920), ref: 0058F0BB
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0058F0C5
                              • FindClose.KERNEL32(00000000), ref: 0058F0D2
                              • FindClose.KERNEL32(00000000), ref: 0058F0E4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                              • String ID: *.*
                              • API String ID: 1803514871-438819550
                              • Opcode ID: daee5f8fcf9d885b8a0946af49f2bd7553eb68c53b2636a503b83898e0b48cdd
                              • Instruction ID: 68180ff4684b6b30c1109fc66586db7ba719480586c2e747154a4cbdd9b19c28
                              • Opcode Fuzzy Hash: daee5f8fcf9d885b8a0946af49f2bd7553eb68c53b2636a503b83898e0b48cdd
                              • Instruction Fuzzy Hash: 9531E336501209AEDB24FBA4EC4DBEE7BACBF49360F100176EC41E21A1DB70DA44DB61
                              APIs
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 005A0953
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,005AF910,00000000,?,00000000,?,?), ref: 005A09C1
                              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 005A0A09
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 005A0A92
                              • RegCloseKey.ADVAPI32(?), ref: 005A0DB2
                              • RegCloseKey.ADVAPI32(00000000), ref: 005A0DBF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Close$ConnectCreateRegistryValue
                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                              • API String ID: 536824911-966354055
                              • Opcode ID: c73b965c22e2b48c5b35b6da733f8ec018ae3c471d8fd256cbcee1846d844b6e
                              • Instruction ID: 65486f750ebf34963b7cc702b83c85fa430ae9dcbab35c66981d27f280ebb725
                              • Opcode Fuzzy Hash: c73b965c22e2b48c5b35b6da733f8ec018ae3c471d8fd256cbcee1846d844b6e
                              • Instruction Fuzzy Hash: B7024B756046129FCB14EF14D859E2ABBE5FF8A314F04885DF8899B3A2CB30EC45CB81
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                              • DragQueryPoint.SHELL32(?,?), ref: 005AC627
                                • Part of subcall function 005AAB37: ClientToScreen.USER32(?,?), ref: 005AAB60
                                • Part of subcall function 005AAB37: GetWindowRect.USER32(?,?), ref: 005AABD6
                                • Part of subcall function 005AAB37: PtInRect.USER32(?,?,005AC014), ref: 005AABE6
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 005AC690
                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 005AC69B
                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 005AC6BE
                              • _wcscat.LIBCMT ref: 005AC6EE
                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 005AC705
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 005AC71E
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 005AC735
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 005AC757
                              • DragFinish.SHELL32(?), ref: 005AC75E
                              • NtdllDialogWndProc_W.NTDLL(?,00000233,?,00000000,?,?,?), ref: 005AC851
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientDialogFinishLongNtdllPointProc_Screen_wcscat
                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pb^
                              • API String ID: 2166380349-368586474
                              • Opcode ID: bcc7f3e958a9a655c16e25f49ee960ee823c5a2026dbe1666731cdb7fc3661e9
                              • Instruction ID: 688aab2d6d6b2fb8d631762a516cbb47658d5dc1a80004b6e5d66aaa837485d0
                              • Opcode Fuzzy Hash: bcc7f3e958a9a655c16e25f49ee960ee823c5a2026dbe1666731cdb7fc3661e9
                              • Instruction Fuzzy Hash: D9615C71108301AFC715DFA4D889DAFBFE8FF9A750F04091EF591961A1DB309949CB92
                              APIs
                              • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 0058F113
                              • _wcscmp.LIBCMT ref: 0058F128
                              • _wcscmp.LIBCMT ref: 0058F13F
                                • Part of subcall function 00584385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 005843A0
                              • FindNextFileW.KERNEL32(00000000,?), ref: 0058F16E
                              • FindClose.KERNEL32(00000000), ref: 0058F179
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 0058F195
                              • _wcscmp.LIBCMT ref: 0058F1BC
                              • _wcscmp.LIBCMT ref: 0058F1D3
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0058F1E5
                              • SetCurrentDirectoryW.KERNEL32(005D8920), ref: 0058F203
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0058F20D
                              • FindClose.KERNEL32(00000000), ref: 0058F21A
                              • FindClose.KERNEL32(00000000), ref: 0058F22C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                              • String ID: *.*
                              • API String ID: 1824444939-438819550
                              • Opcode ID: 5b6733dd6cabd9c2ef8653ef333d11f5fd23edd02f9e514f6a3a1cadf5e8c605
                              • Instruction ID: 3e2cef1f21b8af0ded6b796ea71c2c998b8e7540fff1fd36255110583540068f
                              • Opcode Fuzzy Hash: 5b6733dd6cabd9c2ef8653ef333d11f5fd23edd02f9e514f6a3a1cadf5e8c605
                              • Instruction Fuzzy Hash: 2E31B9395001196ADB20BBA4EC59BEE7FACBF99360F100176EC41F21A0DB30DE45DB54
                              APIs
                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0058A20F
                              • __swprintf.LIBCMT ref: 0058A231
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 0058A26E
                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 0058A293
                              • _memset.LIBCMT ref: 0058A2B2
                              • _wcsncpy.LIBCMT ref: 0058A2EE
                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0058A323
                              • CloseHandle.KERNEL32(00000000), ref: 0058A32E
                              • RemoveDirectoryW.KERNEL32(?), ref: 0058A337
                              • CloseHandle.KERNEL32(00000000), ref: 0058A341
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                              • String ID: :$\$\??\%s
                              • API String ID: 2733774712-3457252023
                              • Opcode ID: ee6d7dc39bd9360546ebda7a1e26ec37b99a22538dacf10aec41ff23cb43ad52
                              • Instruction ID: 15f4628a7591e72e70758de3ccf3138c8c8fe6e16bab00625724a6c565cef4f6
                              • Opcode Fuzzy Hash: ee6d7dc39bd9360546ebda7a1e26ec37b99a22538dacf10aec41ff23cb43ad52
                              • Instruction Fuzzy Hash: 2D3180B590410AABDB219FA0DC49FEB3BBCFF89741F1045B6F909E6160EB7096448B25
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 005AC1FC
                              • GetFocus.USER32 ref: 005AC20C
                              • GetDlgCtrlID.USER32(00000000), ref: 005AC217
                              • _memset.LIBCMT ref: 005AC342
                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 005AC36D
                              • GetMenuItemCount.USER32(?), ref: 005AC38D
                              • GetMenuItemID.USER32(?,00000000), ref: 005AC3A0
                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 005AC3D4
                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 005AC41C
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 005AC454
                              • NtdllDialogWndProc_W.NTDLL(?,00000111,?,?,?,?,?,?,?), ref: 005AC489
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountCtrlDialogFocusLongMessageNtdllPostProc_RadioWindow_memset
                              • String ID: 0
                              • API String ID: 3616455698-4108050209
                              • Opcode ID: 4c0d25e47dac1d0d3e6d1f235277ae11080543d6a19f410aa7d79936bc219cbd
                              • Instruction ID: 204df07378eaffc2d3041c492888d8b5cafbd672ee0e3f4ed7a46013ceab38fd
                              • Opcode Fuzzy Hash: 4c0d25e47dac1d0d3e6d1f235277ae11080543d6a19f410aa7d79936bc219cbd
                              • Instruction Fuzzy Hash: E8818A70608301AFDB24CF64C894A6EBFE9FF8A714F00492EF99597291D770D905DBA2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID: 3cS$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$_S
                              • API String ID: 0-654464195
                              • Opcode ID: f79dc047e55849f5afc23fd83edac0957b474787de630e0dd9e80e2a133d0351
                              • Instruction ID: ba86c5112455ba5626458f6b4b5539a12adc666c0f3633fe0a3a83674e52d696
                              • Opcode Fuzzy Hash: f79dc047e55849f5afc23fd83edac0957b474787de630e0dd9e80e2a133d0351
                              • Instruction Fuzzy Hash: 2B727E75E00619DBDB24CF59D8907AEBBB5FF44310F14856AE809EB290EB309E81DB94
                              APIs
                              • GetKeyboardState.USER32(?), ref: 00580097
                              • SetKeyboardState.USER32(?), ref: 00580102
                              • GetAsyncKeyState.USER32(000000A0), ref: 00580122
                              • GetKeyState.USER32(000000A0), ref: 00580139
                              • GetAsyncKeyState.USER32(000000A1), ref: 00580168
                              • GetKeyState.USER32(000000A1), ref: 00580179
                              • GetAsyncKeyState.USER32(00000011), ref: 005801A5
                              • GetKeyState.USER32(00000011), ref: 005801B3
                              • GetAsyncKeyState.USER32(00000012), ref: 005801DC
                              • GetKeyState.USER32(00000012), ref: 005801EA
                              • GetAsyncKeyState.USER32(0000005B), ref: 00580213
                              • GetKeyState.USER32(0000005B), ref: 00580221
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: 73db6915d4e7bb53ed670954a54c77c925be8c6d51ad07fa43bb98319c026a3e
                              • Instruction ID: 748c50b63e4cce7618373404b708e744c077fbf06bbf269d7b22bb585fdbfec6
                              • Opcode Fuzzy Hash: 73db6915d4e7bb53ed670954a54c77c925be8c6d51ad07fa43bb98319c026a3e
                              • Instruction Fuzzy Hash: D551EB309047896DFB75FBA088197BABFB4AF01380F485599DDC2761C3DAA49B8CC761
                              APIs
                                • Part of subcall function 005A0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0059FDAD,?,?), ref: 005A0E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 005A04AC
                                • Part of subcall function 00529837: __itow.LIBCMT ref: 00529862
                                • Part of subcall function 00529837: __swprintf.LIBCMT ref: 005298AC
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 005A054B
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 005A05E3
                              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 005A0822
                              • RegCloseKey.ADVAPI32(00000000), ref: 005A082F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                              • String ID:
                              • API String ID: 1240663315-0
                              • Opcode ID: ac7d4931244bbff9fbc85109377a5f7cb491783a6e5330a65f1cb43f1fde55bd
                              • Instruction ID: 3b8ea548d380e19430fc326e9971ae6145555ff3494f1a1eb07b4fe30510f43a
                              • Opcode Fuzzy Hash: ac7d4931244bbff9fbc85109377a5f7cb491783a6e5330a65f1cb43f1fde55bd
                              • Instruction Fuzzy Hash: 28E13D71604215AFCB14DF24C895D6EBBE4FF8A314F04896DF94ADB2A1DA30ED05CB91
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                              • String ID:
                              • API String ID: 1737998785-0
                              • Opcode ID: 9badca12f9799b69f65290bb1550239d2532b34ca03a6a13cc93b7b48f5e7930
                              • Instruction ID: fdf8f269e4c76c346873bfa2d6021f6297d73293205d47ae30ec43bb76f69212
                              • Opcode Fuzzy Hash: 9badca12f9799b69f65290bb1550239d2532b34ca03a6a13cc93b7b48f5e7930
                              • Instruction Fuzzy Hash: 9621BF392006119FDB14AF60EC09F6D7FA8FF56314F04802AF946DB2A1DB30AC02EB94
                              APIs
                                • Part of subcall function 00524750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00524743,?,?,005237AE,?), ref: 00524770
                                • Part of subcall function 00584A31: GetFileAttributesW.KERNEL32(?,0058370B), ref: 00584A32
                              • FindFirstFileW.KERNEL32(?,?), ref: 005838A3
                              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 0058394B
                              • MoveFileW.KERNEL32(?,?), ref: 0058395E
                              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 0058397B
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 0058399D
                              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 005839B9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                              • String ID: \*.*
                              • API String ID: 4002782344-1173974218
                              • Opcode ID: 40b8dd21dd44f1ca7b8bb96ecfed182b54868393e9c802960018663f7b989e66
                              • Instruction ID: fd036f3fbee7bafc6d4e2e81f2b6fe285d47a574a7eb5fa1c7f7495ca5fb61a6
                              • Opcode Fuzzy Hash: 40b8dd21dd44f1ca7b8bb96ecfed182b54868393e9c802960018663f7b989e66
                              • Instruction Fuzzy Hash: 99516C3180515EAACF15FFA0E99A9EDBF79BF56300F600069E84676191EB316F09CB60
                              APIs
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 0058F440
                              • Sleep.KERNEL32(0000000A), ref: 0058F470
                              • _wcscmp.LIBCMT ref: 0058F484
                              • _wcscmp.LIBCMT ref: 0058F49F
                              • FindNextFileW.KERNEL32(?,?), ref: 0058F53D
                              • FindClose.KERNEL32(00000000), ref: 0058F553
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                              • String ID: *.*
                              • API String ID: 713712311-438819550
                              • Opcode ID: f0f66e50bf8a2728fdad1eea64a3eb82ec3d96ef378fbff6ab4c4d48073f8305
                              • Instruction ID: 97f30e9e59a3fdde87f08b6378ae6eeebaddd308295c7a7487861265b44dba7c
                              • Opcode Fuzzy Hash: f0f66e50bf8a2728fdad1eea64a3eb82ec3d96ef378fbff6ab4c4d48073f8305
                              • Instruction Fuzzy Hash: 9B414E7190021A9FCF14EFA4DC49AEEBFB4FF5A310F14456AE815A31A1EB309E85DB50
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                              • GetSystemMetrics.USER32(0000000F), ref: 005AD47C
                              • GetSystemMetrics.USER32(0000000F), ref: 005AD49C
                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 005AD6D7
                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 005AD6F5
                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 005AD716
                              • ShowWindow.USER32(00000003,00000000), ref: 005AD735
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 005AD75A
                              • NtdllDialogWndProc_W.NTDLL(?,00000005,?,?), ref: 005AD77D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$MessageMetricsSendSystem$DialogInvalidateLongMoveNtdllProc_RectShow
                              • String ID:
                              • API String ID: 830902736-0
                              • Opcode ID: c7ef6d84a7ff41fa6cbfc7df30d54aa05a7300337a4a3fe7cbf55b2bb96b0108
                              • Instruction ID: 3fdb91f006b0d42c6476ba8a4f95513b817d4027c046f7dac3b742affe98901d
                              • Opcode Fuzzy Hash: c7ef6d84a7ff41fa6cbfc7df30d54aa05a7300337a4a3fe7cbf55b2bb96b0108
                              • Instruction Fuzzy Hash: 3EB1AB71600229EBDF18DF68C9C57AD7BB1FF0A701F088069ED4A9F695D734A950CBA0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __itow__swprintf
                              • String ID: 3cS$_S
                              • API String ID: 674341424-3431193023
                              • Opcode ID: aea090a724faa9b3bed88e67fc58da9b660b70a46e500ca880e56dd85c169da2
                              • Instruction ID: d497acce88106c18491bb5254c45aa277497c5a36bbcbfb13e4a35cd6cd03344
                              • Opcode Fuzzy Hash: aea090a724faa9b3bed88e67fc58da9b660b70a46e500ca880e56dd85c169da2
                              • Instruction Fuzzy Hash: 97228A716083129FCB24DF24D885B6EBBE4BFC5310F14492CF89A97291EB31E944CB92
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: e99411be43a44a1565f39f0b18d93424b7c9d24d0524ec74816ee39063779598
                              • Instruction ID: 7155e9415ef2b605b6784285a94d7d9012ba7cffc1e46c4fd6a8c6120a6c24f8
                              • Opcode Fuzzy Hash: e99411be43a44a1565f39f0b18d93424b7c9d24d0524ec74816ee39063779598
                              • Instruction Fuzzy Hash: 2112AE70A0061ADFDF14DFA4D985AEEBBF5FF88300F209529E406E7291EB35A914DB50
                              APIs
                                • Part of subcall function 005787E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0057882B
                                • Part of subcall function 005787E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00578858
                                • Part of subcall function 005787E1: GetLastError.KERNEL32 ref: 00578865
                              • ExitWindowsEx.USER32(?,00000000), ref: 005851F9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                              • String ID: $@$SeShutdownPrivilege
                              • API String ID: 2234035333-194228
                              • Opcode ID: c9f31e5e18b9600af750464d99f1c60ce01df1515ff7768a50f23ec2268b4dd7
                              • Instruction ID: 5568cf57aa03618906f83c95faa541a38bc94dfde12044d99b6bf0858bbb8451
                              • Opcode Fuzzy Hash: c9f31e5e18b9600af750464d99f1c60ce01df1515ff7768a50f23ec2268b4dd7
                              • Instruction Fuzzy Hash: 0001F7397916126BEB287268AC8EFBA7E58FB05740F600821FD57F20D2FD511C009790
                              APIs
                              • socket.WS2_32(00000002,00000001,00000006), ref: 005962DC
                              • WSAGetLastError.WS2_32(00000000), ref: 005962EB
                              • bind.WS2_32(00000000,?,00000010), ref: 00596307
                              • listen.WS2_32(00000000,00000005), ref: 00596316
                              • WSAGetLastError.WS2_32(00000000), ref: 00596330
                              • closesocket.WS2_32(00000000), ref: 00596344
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ErrorLast$bindclosesocketlistensocket
                              • String ID:
                              • API String ID: 1279440585-0
                              • Opcode ID: d4f9e8698c2fbf1671ab3f9e1eefd54e8080e9735e8baa7dd8c789ab6f688ae0
                              • Instruction ID: 4494c22394434cf791f71a1065a027305463690ab7c75e1da8f77e6c35f3d273
                              • Opcode Fuzzy Hash: d4f9e8698c2fbf1671ab3f9e1eefd54e8080e9735e8baa7dd8c789ab6f688ae0
                              • Instruction Fuzzy Hash: 11210131200211AFCF10EF64D889B6EBBA8FF8A720F148559F816A73D1CB30AC09DB50
                              APIs
                                • Part of subcall function 00540DB6: std::exception::exception.LIBCMT ref: 00540DEC
                                • Part of subcall function 00540DB6: __CxxThrowException@8.LIBCMT ref: 00540E01
                              • _memmove.LIBCMT ref: 00570258
                              • _memmove.LIBCMT ref: 0057036D
                              • _memmove.LIBCMT ref: 00570414
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memmove$Exception@8Throwstd::exception::exception
                              • String ID:
                              • API String ID: 1300846289-0
                              • Opcode ID: 44d217bf3952cf2b97106ea7928a0b508aaaf1afe529a252eef2e5c33cff2f70
                              • Instruction ID: 5e49d40769330a7a22e1dd776e16bcac3b79179a08532201a147893668a5ec87
                              • Opcode Fuzzy Hash: 44d217bf3952cf2b97106ea7928a0b508aaaf1afe529a252eef2e5c33cff2f70
                              • Instruction Fuzzy Hash: 6502C2B0A0020ADBCF04DF64E985AAE7FF5FF84300F549469E80ADB295EB31D954DB91
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                              • NtdllDialogWndProc_W.NTDLL(?,?,?,?,?), ref: 005219FA
                              • GetSysColor.USER32(0000000F), ref: 00521A4E
                              • SetBkColor.GDI32(?,00000000), ref: 00521A61
                                • Part of subcall function 00521290: NtdllDialogWndProc_W.NTDLL(?,00000020,?), ref: 005212D8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ColorDialogNtdllProc_$LongWindow
                              • String ID:
                              • API String ID: 591255283-0
                              • Opcode ID: 64fa29c39343d6b752fa681ba135c5a553b7353410169f78c6be417226d8542c
                              • Instruction ID: fbe28bca5c99d8c56fbdb5287943b6acf674325cc16f04c7f5b9c0a82a37c82f
                              • Opcode Fuzzy Hash: 64fa29c39343d6b752fa681ba135c5a553b7353410169f78c6be417226d8542c
                              • Instruction Fuzzy Hash: 65A16B71106D65BAE728AA38AC5CE7F3E6DFFA3342B14051AF402D51D2DB229D0092F9
                              APIs
                                • Part of subcall function 00597D8B: inet_addr.WS2_32(00000000), ref: 00597DB6
                              • socket.WS2_32(00000002,00000002,00000011), ref: 0059679E
                              • WSAGetLastError.WS2_32(00000000), ref: 005967C7
                              • bind.WS2_32(00000000,?,00000010), ref: 00596800
                              • WSAGetLastError.WS2_32(00000000), ref: 0059680D
                              • closesocket.WS2_32(00000000), ref: 00596821
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ErrorLast$bindclosesocketinet_addrsocket
                              • String ID:
                              • API String ID: 99427753-0
                              • Opcode ID: 5ff4736b3e1826575d32f8ec3ad5651496cfb1fc934847e484320389cb66e3fd
                              • Instruction ID: 04ff01cfe0ea3724ecb03cff43130079038326e3827521e76436fff26bf7a53a
                              • Opcode Fuzzy Hash: 5ff4736b3e1826575d32f8ec3ad5651496cfb1fc934847e484320389cb66e3fd
                              • Instruction Fuzzy Hash: CC41E475A00221AFDB14BF649C8AF7E7BE8FF86714F448458F919AB3C2CA709D058791
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                              • String ID:
                              • API String ID: 292994002-0
                              • Opcode ID: 7c039a1c5136151a8af8c8d3c48bb43275146cb6065d69d9410b64c6b7b7f5bb
                              • Instruction ID: 856464a9051e35be2a34011e034ce71cf12372a6b174c40e5381d367478aca30
                              • Opcode Fuzzy Hash: 7c039a1c5136151a8af8c8d3c48bb43275146cb6065d69d9410b64c6b7b7f5bb
                              • Instruction Fuzzy Hash: AA11B2327009216FEB215F66AC48E6E7F98FFD77A1B444839F846D7241EB709C0196A0
                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 005780C0
                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 005780CA
                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 005780D9
                              • RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 005780E0
                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 005780F6
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocateErrorLastProcess
                              • String ID:
                              • API String ID: 47921759-0
                              • Opcode ID: da6b070c8f90928fc1b4c3c2ab80747e79ed17225e51ad90a7a7e279e0b06aab
                              • Instruction ID: 8c4b9c297535e9f6e4b166b9ac449e5e03aea9cac020052e052f7dfd3e26eb6b
                              • Opcode Fuzzy Hash: da6b070c8f90928fc1b4c3c2ab80747e79ed17225e51ad90a7a7e279e0b06aab
                              • Instruction Fuzzy Hash: A7F06231240204AFEB100FA5EC8DE7B3FACFF4A755B404025F949C6150CB619C45EB60
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 0058C432
                              • CoCreateInstance.COMBASE(005B2D6C,00000000,00000001,005B2BDC,?), ref: 0058C44A
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                              • CoUninitialize.COMBASE ref: 0058C6B7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CreateInitializeInstanceUninitialize_memmove
                              • String ID: .lnk
                              • API String ID: 2683427295-24824748
                              • Opcode ID: 9baab8e9ca00070cb697da46012333230171498d27e0ba3e8dc155328eff9179
                              • Instruction ID: 5c7fb00db1263728e3401238f7ed35444b97a40f8440e4bfe4e3355773f52185
                              • Opcode Fuzzy Hash: 9baab8e9ca00070cb697da46012333230171498d27e0ba3e8dc155328eff9179
                              • Instruction Fuzzy Hash: 89A14B71104206AFD300EF54D885EABBBE8FFCA314F00492CF55597292EB71E949CB62
                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32 ref: 0059EE3D
                              • Process32FirstW.KERNEL32(00000000,?), ref: 0059EE4B
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                              • Process32NextW.KERNEL32(00000000,?), ref: 0059EF0B
                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0059EF1A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                              • String ID:
                              • API String ID: 2576544623-0
                              • Opcode ID: 7b804cce7a74658d7365dd5884c2553ab2e8040335041324998ea8ccc97f3e3d
                              • Instruction ID: 703f069c4ed6eb274236f09aaaab42f0882f086cda3048ef3e9b2a1badf2a237
                              • Opcode Fuzzy Hash: 7b804cce7a74658d7365dd5884c2553ab2e8040335041324998ea8ccc97f3e3d
                              • Instruction Fuzzy Hash: E7518071504316AFD710EF24D88AE6BBBE8FF95710F40481DF595962A1EB70A908CB92
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                              • GetCursorPos.USER32(?), ref: 005AC4D2
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,0055B9AB,?,?,?,?,?), ref: 005AC4E7
                              • GetCursorPos.USER32(?), ref: 005AC534
                              • NtdllDialogWndProc_W.NTDLL(?,0000007B,?,?,?,?,?,?,?,?,?,?,0055B9AB,?,?,?), ref: 005AC56E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Cursor$DialogLongMenuNtdllPopupProc_TrackWindow
                              • String ID:
                              • API String ID: 1423138444-0
                              • Opcode ID: 39e928177082aaee827d0a469b32db535ee84c0a9734e22b3f2b6081c40bad62
                              • Instruction ID: 967af9eda18dea0ba322163b9e372a75132879fea34ac1e9587dc712f733d710
                              • Opcode Fuzzy Hash: 39e928177082aaee827d0a469b32db535ee84c0a9734e22b3f2b6081c40bad62
                              • Instruction Fuzzy Hash: D7316F39A00458EFCB258F98C898EAE7FB5FF4F310F444169F9458B261D731A950EBA4
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                              • NtdllDialogWndProc_W.NTDLL(?,00000020,?), ref: 005212D8
                              • GetClientRect.USER32(?,?), ref: 0055B5FB
                              • GetCursorPos.USER32(?), ref: 0055B605
                              • ScreenToClient.USER32(?,?), ref: 0055B610
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Client$CursorDialogLongNtdllProc_RectScreenWindow
                              • String ID:
                              • API String ID: 1010295502-0
                              • Opcode ID: 83527f54073d8d49faf24118fd3448b9dc23f7085f8a3dd250489fdd05eddc9c
                              • Instruction ID: 0cfb939b95201b00532fa6cab7e8a0eb7f7869525870d3a504914f5707439821
                              • Opcode Fuzzy Hash: 83527f54073d8d49faf24118fd3448b9dc23f7085f8a3dd250489fdd05eddc9c
                              • Instruction Fuzzy Hash: A6116D3A90042AEFCB10DF95E8899EF7BB8FF56300F100455F941E7181D730BA559BA9
                              APIs
                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 0057E628
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: lstrlen
                              • String ID: ($|
                              • API String ID: 1659193697-1631851259
                              • Opcode ID: fdd70c3e65f7f0c6ad42bda7ea2770abcf06c30d37516b1ad489ee326d80421e
                              • Instruction ID: e95ed6731c37db071860e126fef387844d203af13a8fd76c0b3727b38ea87887
                              • Opcode Fuzzy Hash: fdd70c3e65f7f0c6ad42bda7ea2770abcf06c30d37516b1ad489ee326d80421e
                              • Instruction Fuzzy Hash: 05322675A007059FD728CF29D48596ABBF1FF48310B15C4AEE99ADB3A1E770E941CB40
                              APIs
                              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0059180A,00000000), ref: 005923E1
                              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00592418
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Internet$AvailableDataFileQueryRead
                              • String ID:
                              • API String ID: 599397726-0
                              • Opcode ID: 402d7f9aaa461f40de6238c3739fccb6d6c8050af86155653d2121ef865c2478
                              • Instruction ID: a1b20ef43746f33fac29e2c4ba0e89cb9275252ed09fba0811760b7e192c4e7c
                              • Opcode Fuzzy Hash: 402d7f9aaa461f40de6238c3739fccb6d6c8050af86155653d2121ef865c2478
                              • Instruction Fuzzy Hash: E241C371904209BFEF209E95DC85EBBBFBCFB80314F10446AF645A6141EB759E419A60
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0058B343
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 0058B39D
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 0058B3EA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID:
                              • API String ID: 1682464887-0
                              • Opcode ID: 4bf9020338ec232d9780bfef9d944779035fe748373c9b1bbd27d64e03e547d1
                              • Instruction ID: 6e8c9e5bdd62d046a97ed7d12d4cd7e0184eaa4e4bd2cd4bf97de5cec4ebd114
                              • Opcode Fuzzy Hash: 4bf9020338ec232d9780bfef9d944779035fe748373c9b1bbd27d64e03e547d1
                              • Instruction Fuzzy Hash: 49216035A00518EFCB00EFA5E885AEDBFB8FF89310F1480AAE905AB351DB319915DB50
                              APIs
                                • Part of subcall function 00540DB6: std::exception::exception.LIBCMT ref: 00540DEC
                                • Part of subcall function 00540DB6: __CxxThrowException@8.LIBCMT ref: 00540E01
                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0057882B
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00578858
                              • GetLastError.KERNEL32 ref: 00578865
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                              • String ID:
                              • API String ID: 1922334811-0
                              • Opcode ID: 6039148a9c505d22b84835f06cf4252823d4272199a7a2ed249fd102d1b742b8
                              • Instruction ID: 8cd6528c41e216c6ebf5a447319f6ea9562edfefe3b60666cfbd18d7216726cd
                              • Opcode Fuzzy Hash: 6039148a9c505d22b84835f06cf4252823d4272199a7a2ed249fd102d1b742b8
                              • Instruction Fuzzy Hash: 4B1160B1814205AFD718DFA4EC89D6BBBB8FB45715B20852EE45A97241DA30BC449B60
                              APIs
                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00578774
                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 0057878B
                              • FreeSid.ADVAPI32(?), ref: 0057879B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: AllocateCheckFreeInitializeMembershipToken
                              • String ID:
                              • API String ID: 3429775523-0
                              • Opcode ID: 35c6611ac73f48350b43225a8fd21d829d6e56a9d9ade63281e4870ac9990283
                              • Instruction ID: 2cad32e0feb555710beb397881d93e6d9c2a0af484cdf44440218a1097316b6b
                              • Opcode Fuzzy Hash: 35c6611ac73f48350b43225a8fd21d829d6e56a9d9ade63281e4870ac9990283
                              • Instruction Fuzzy Hash: 45F03C75951208BBDB04DFE49C89AAEBBB8FF08201F1044A9A502E2181E6715A089B50
                              APIs
                              • __time64.LIBCMT ref: 0058889B
                                • Part of subcall function 0054520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00588F6E,00000000,?,?,?,?,0058911F,00000000,?), ref: 00545213
                                • Part of subcall function 0054520A: __aulldiv.LIBCMT ref: 00545233
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Time$FileSystem__aulldiv__time64
                              • String ID: 0e^
                              • API String ID: 2893107130-1332993939
                              • Opcode ID: 9f9c2af5fbd157846b8e2f3263280b1c6ce3eb9c9f5a635076419f960451e9ff
                              • Instruction ID: f1bfecfb53885ffa3d9d06f27d0710e0e2dde4ce69035774aac61f398ce84d2b
                              • Opcode Fuzzy Hash: 9f9c2af5fbd157846b8e2f3263280b1c6ce3eb9c9f5a635076419f960451e9ff
                              • Instruction Fuzzy Hash: 8121D2326256108BC329CF25D881A62B7E1EBB4310B688E6CD4F5CF2C0CA34A905DF54
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                                • Part of subcall function 005225DB: GetWindowLongW.USER32(?,000000EB), ref: 005225EC
                              • GetParent.USER32(?), ref: 0055B7BA
                              • NtdllDialogWndProc_W.NTDLL(?,00000133,?,?,?,?,?,?,?,?,005219B3,?,?,?,00000006,?), ref: 0055B834
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: LongWindow$DialogNtdllParentProc_
                              • String ID:
                              • API String ID: 314495775-0
                              • Opcode ID: a5c2fdc720d3712523c22ea2096a9572d5e4fe60a48c609a8df5fe41141291af
                              • Instruction ID: b7365376d1fc957159980965cf6bd6aa98fb1707007f511f5ee90be3fbecfde2
                              • Opcode Fuzzy Hash: a5c2fdc720d3712523c22ea2096a9572d5e4fe60a48c609a8df5fe41141291af
                              • Instruction Fuzzy Hash: 9F21E634200954AFDB248F28E898DAA3FD6FF9B320F584251F9554B2F2D7315D11DB54
                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 0058C6FB
                              • FindClose.KERNEL32(00000000), ref: 0058C72B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: 747930639857e31d8d27bff077a1757540ae41916eeae8ee6afdeb1dddbfc5df
                              • Instruction ID: 8c440c952c81cebcebe558c6d722846da866b00862a1d5f2a75a0d46fcf526e0
                              • Opcode Fuzzy Hash: 747930639857e31d8d27bff077a1757540ae41916eeae8ee6afdeb1dddbfc5df
                              • Instruction Fuzzy Hash: 2E1182726006019FDB10EF29D849A2AFBE4FF85320F04851DF8AAD7390DB30AC05CB91
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                              • NtdllDialogWndProc_W.NTDLL(?,0000002B,?,?,?,?,?,?,?,0055B93A,?,?,?), ref: 005AC5F1
                                • Part of subcall function 005225DB: GetWindowLongW.USER32(?,000000EB), ref: 005225EC
                              • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 005AC5D7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: LongWindow$DialogMessageNtdllProc_Send
                              • String ID:
                              • API String ID: 1273190321-0
                              • Opcode ID: c2d120f4b26f2554ad67742d9e234b417897f73103c8284692d815ba0ee2bb49
                              • Instruction ID: 12145179c431feff1d15596b6c12591335ab48331e20aecc425e29339a8ede01
                              • Opcode Fuzzy Hash: c2d120f4b26f2554ad67742d9e234b417897f73103c8284692d815ba0ee2bb49
                              • Instruction Fuzzy Hash: C801B135200254EBCB259F14DC88E6E3FA6FF9A364F140528F9411B2E1CB72A815EBA0
                              APIs
                              • ClientToScreen.USER32(?,?), ref: 005AC961
                              • NtdllDialogWndProc_W.NTDLL(?,00000200,?,?,?,?,?,?,?,0055BA16,?,?,?,?,?), ref: 005AC98A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ClientDialogNtdllProc_Screen
                              • String ID:
                              • API String ID: 3420055661-0
                              • Opcode ID: 478776a31638d8d5eb53e9a2559d6189ad8c016b13188391c73c948a7b5c2d53
                              • Instruction ID: 332902b193656517f646d6f81c62a4db7036a0600866d7e58aa94e292c3710ea
                              • Opcode Fuzzy Hash: 478776a31638d8d5eb53e9a2559d6189ad8c016b13188391c73c948a7b5c2d53
                              • Instruction Fuzzy Hash: 7FF03A7240021CFFEF049F85EC09DAE7FB9FB49311F10416AF941A2161D3716A64EBA4
                              APIs
                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00599468,?,005AFB84,?), ref: 0058A097
                              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00599468,?,005AFB84,?), ref: 0058A0A9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ErrorFormatLastMessage
                              • String ID:
                              • API String ID: 3479602957-0
                              • Opcode ID: c53543a3a1f2c33ad840f151152191403ae110538bcb208c93329201ca68860e
                              • Instruction ID: b15b53348b9ecfb410da224ff381d2f72f3074b5a24b04072037c067738c9a5e
                              • Opcode Fuzzy Hash: c53543a3a1f2c33ad840f151152191403ae110538bcb208c93329201ca68860e
                              • Instruction Fuzzy Hash: 3FF0823520522DABDB21AFA4DC4CFEA7B6CBF09362F004166FD09D6181D670A944CBA1
                              APIs
                              • GetWindowLongW.USER32(?,000000EC), ref: 005ACA84
                              • NtdllDialogWndProc_W.NTDLL(?,00000084,00000000,?,?,0055B995,?,?,?,?), ref: 005ACAB2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: f56669431df711dcbcdd708ebd8d5217f65e453ad55b40ed7d58235294f8322a
                              • Instruction ID: e80e0fbb30b592f74eb253501f3de8cb5cca98563f1c0b9d8d1083707e6ca01f
                              • Opcode Fuzzy Hash: f56669431df711dcbcdd708ebd8d5217f65e453ad55b40ed7d58235294f8322a
                              • Instruction Fuzzy Hash: 7DE04F70100218BBEB149F19DC0AFBE3F54EB15751F408515F99ADA1E1C6709850A760
                              APIs
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00578309), ref: 005781E0
                              • CloseHandle.KERNEL32(?,?,00578309), ref: 005781F2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: AdjustCloseHandlePrivilegesToken
                              • String ID:
                              • API String ID: 81990902-0
                              • Opcode ID: e3172261e2341c494475091f1e0cfefc45cbda37e7d211fa887b560b4deebf2d
                              • Instruction ID: bc386e02eddb5467a5b456da051c7ac4d61297562eedac31e6d0d90e9c410ee6
                              • Opcode Fuzzy Hash: e3172261e2341c494475091f1e0cfefc45cbda37e7d211fa887b560b4deebf2d
                              • Instruction Fuzzy Hash: 54E04632010611AEEB252B61EC08DB37BAEFB00315720882DB9A680470CB32ACA0EB10
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,005B4178,00548D57,t of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.,?,?,00000001), ref: 0054A15A
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 0054A163
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 0feb659e9b18759ae865a81d7c8ab1623b8605372ecfb6b392db81076a50edc9
                              • Instruction ID: 3a307619dc7671e9401d9b8149ab201a6a0271077954b8a0373a322e33299833
                              • Opcode Fuzzy Hash: 0feb659e9b18759ae865a81d7c8ab1623b8605372ecfb6b392db81076a50edc9
                              • Instruction Fuzzy Hash: C3B09231054208ABCF002BD1EC59B883F68EB56AA2F404422F60D84060CBA25454AB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d3b905179bdc57511ed456642295ac6d2d980706ec008e17b061f6fdc6e9862c
                              • Instruction ID: bc50c6a9a2b6976438711b65d59772aa151d8e97597e74357450a1619773639f
                              • Opcode Fuzzy Hash: d3b905179bdc57511ed456642295ac6d2d980706ec008e17b061f6fdc6e9862c
                              • Instruction Fuzzy Hash: 78320231D29F054DDB639638D872336A688BFB73C8F15D737E819B59A6EB28D4835200
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9906c11176c6614517ee8d2050b86b1769b0f371f956182c10398a18b0f04296
                              • Instruction ID: 5387973fbb49cc4f3f0cf71b8ca8f4c76c939bbd32fb943986bc2e9d1ea560c4
                              • Opcode Fuzzy Hash: 9906c11176c6614517ee8d2050b86b1769b0f371f956182c10398a18b0f04296
                              • Instruction Fuzzy Hash: 31B11F20E2AF404DD76396388831336BA9CAFBB2C5F52D71BFC2674D22EB2195875241
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                              • NtdllDialogWndProc_W.NTDLL(?,00000112,?,00000000), ref: 005AD838
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: 5b03bce31799f8cbcb7e1c0dec5e12294c417262455333e0df24c834d762623b
                              • Instruction ID: 29c600037023f1526265136324d316236aba0ca9f3865e1ed31d121d475ddb80
                              • Opcode Fuzzy Hash: 5b03bce31799f8cbcb7e1c0dec5e12294c417262455333e0df24c834d762623b
                              • Instruction Fuzzy Hash: A3110834204256ABEB296A2CCC49F7E3F64F743B20F204714F9535A9D2CA649D0093B0
                              APIs
                                • Part of subcall function 005225DB: GetWindowLongW.USER32(?,000000EB), ref: 005225EC
                              • NtdllDialogWndProc_W.NTDLL(?,00000115,?,?,?,?,?,?,0055B952,?,?,?,?,00000000,?), ref: 005AD432
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: 04b134d99153b95e7d3243a9dea1ba1497f60c9f7b37ec4c8ab48f429920e581
                              • Instruction ID: b601014c680e61e1c4780243b241893158c176a148af16090d09a03bfccd7180
                              • Opcode Fuzzy Hash: 04b134d99153b95e7d3243a9dea1ba1497f60c9f7b37ec4c8ab48f429920e581
                              • Instruction Fuzzy Hash: 1601F535600114AFDF14AE25D849AAD3FA2FF4B325F444125F9471B592C370BC1197B0
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                              • NtdllDialogWndProc_W.NTDLL(?,00000006,00000000,?,?,?,00521B04,?,?,?,?,?), ref: 005218E2
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: 0bf885cdee72932af9c301fc4df2aeb1c158ee9781e63f92200892c5cd13cbf3
                              • Instruction ID: 84b36cf01361a314ed66d623693f30f931d5d87c9469e98f0847bcb7de159a7d
                              • Opcode Fuzzy Hash: 0bf885cdee72932af9c301fc4df2aeb1c158ee9781e63f92200892c5cd13cbf3
                              • Instruction Fuzzy Hash: D6F0BE34600669EFCB1CDF15E8909263BE2FB66350F504128F9924B2E1DB31D860EB50
                              APIs
                              • NtdllDialogWndProc_W.NTDLL(?,00000232,?,?), ref: 005AC8FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: 4316a6109bfd8afc4cb88d4546d0a6ac9870bf1e64a7aca8bcf160754c17b640
                              • Instruction ID: 2506165dfc805fa98241dd621da20eadaaf98ba45af180d9f4e103506a8ecad4
                              • Opcode Fuzzy Hash: 4316a6109bfd8afc4cb88d4546d0a6ac9870bf1e64a7aca8bcf160754c17b640
                              • Instruction Fuzzy Hash: EEF06D35200295AFDB21DF58DC45FC63F95FB1A320F144018BA51672E2CB706820E7A0
                              APIs
                              • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00584C76
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: mouse_event
                              • String ID:
                              • API String ID: 2434400541-0
                              • Opcode ID: 1730f8cc40c00dff0f2fadfdb3a139439ed68e2fe6f2ed2bfd204b9ed465fb4b
                              • Instruction ID: 70616d2f65b1b0fa9fe71b6d36260cf304d12b4fd5a75ccac8d1e5021544f359
                              • Opcode Fuzzy Hash: 1730f8cc40c00dff0f2fadfdb3a139439ed68e2fe6f2ed2bfd204b9ed465fb4b
                              • Instruction Fuzzy Hash: 57D05EA012220B39EE282B208D8FF7A190DF3C0781F84854E7E41B50C0E8D85C00AF34
                              APIs
                              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00578389), ref: 005787D1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: LogonUser
                              • String ID:
                              • API String ID: 1244722697-0
                              • Opcode ID: e0932277dcf3688b5b1e02ec0b9cda0e5910fa1a31d6f2dea1018f4219741e07
                              • Instruction ID: c7998952327f4d7745e8a901b13e0b47232c3be4fd3bf696554288d7555275a7
                              • Opcode Fuzzy Hash: e0932277dcf3688b5b1e02ec0b9cda0e5910fa1a31d6f2dea1018f4219741e07
                              • Instruction Fuzzy Hash: C6D05E322A050EABEF018EA4DC05EAE3B69EB04B01F408111FE16C50A1C775D835AB60
                              APIs
                              • NtdllDialogWndProc_W.NTDLL(?,00000053,?,?,?,0055B9BC,?,?,?,?,?,?), ref: 005AC934
                                • Part of subcall function 005AB635: _memset.LIBCMT ref: 005AB644
                                • Part of subcall function 005AB635: _memset.LIBCMT ref: 005AB653
                                • Part of subcall function 005AB635: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,005E6F20,005E6F64), ref: 005AB682
                                • Part of subcall function 005AB635: CloseHandle.KERNEL32 ref: 005AB694
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memset$CloseCreateDialogHandleNtdllProc_Process
                              • String ID:
                              • API String ID: 2364484715-0
                              • Opcode ID: 183bbc138f6c6f0ce35aed045046b951e69c97f1aab6c210f5bb5941f3e98484
                              • Instruction ID: f18e004a8866afed36a0d94ae7e4634bca4acfa197b67bd19f70ed8525e2bef2
                              • Opcode Fuzzy Hash: 183bbc138f6c6f0ce35aed045046b951e69c97f1aab6c210f5bb5941f3e98484
                              • Instruction Fuzzy Hash: A7E0B635110209EFCB11AF54ED55E9A3FB5FB1D715F018055FA065B2B2C731A960EF90
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                              • NtdllDialogWndProc_W.NTDLL(?,00000007,?,00000000,00000000,?,?,?,00521AEE,?,?,?), ref: 005216AB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: DialogLongNtdllProc_Window
                              • String ID:
                              • API String ID: 2065330234-0
                              • Opcode ID: de5e0a60262c7397befd1bdeca6f33960bd2b982fb2dab85245b9c7747688614
                              • Instruction ID: 857512d3bbaab4b51a965525b45b847fd8e6eee9f61133e1188249b9723e6165
                              • Opcode Fuzzy Hash: de5e0a60262c7397befd1bdeca6f33960bd2b982fb2dab85245b9c7747688614
                              • Instruction Fuzzy Hash: F1E0EC35500218FBCF19AF91EC55E643F26FF99354F508418FA850A2A2CA72A921EB50
                              APIs
                              • NtdllDialogWndProc_W.NTDLL ref: 005AC885
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: 78e2951c09ac6962e31d318e3176b9806a6e4fb9846b60a3ce426342b2602eaf
                              • Instruction ID: 3d6aedb66a27d7ac26541712832ab6398c4b168a7ca8484f31a030de1157004c
                              • Opcode Fuzzy Hash: 78e2951c09ac6962e31d318e3176b9806a6e4fb9846b60a3ce426342b2602eaf
                              • Instruction Fuzzy Hash: 3FE0E235204248EFCB01DF88E884E863BA5AB2D300F004054FA054B262C771A820EBA1
                              APIs
                              • NtdllDialogWndProc_W.NTDLL ref: 005AC8B4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: DialogNtdllProc_
                              • String ID:
                              • API String ID: 3239928679-0
                              • Opcode ID: 287761c0230bceb3032bbbce0ee4471d734a76cfb021e71d2c17357e059cc48e
                              • Instruction ID: c403d6dc6979ecb7a18d2c23fe804d98aed4ee4f9ff46cf3a34288aefaafb89f
                              • Opcode Fuzzy Hash: 287761c0230bceb3032bbbce0ee4471d734a76cfb021e71d2c17357e059cc48e
                              • Instruction Fuzzy Hash: 04E0E235200248EFCB01DF88E984D863BA5AB2D300F004054FA054B262C771A824EBA1
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                                • Part of subcall function 0052201B: DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 005220D3
                                • Part of subcall function 0052201B: KillTimer.USER32(-00000001,?,?,?,?,005216CB,00000000,?,?,00521AE2,?,?), ref: 0052216E
                              • NtdllDialogWndProc_W.NTDLL(?,00000002,00000000,00000000,00000000,?,?,00521AE2,?,?), ref: 005216D4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$DestroyDialogKillLongNtdllProc_Timer
                              • String ID:
                              • API String ID: 2797419724-0
                              • Opcode ID: 90479eef3df0e1eb02a2e6eea9e591ca1a4f717c6add4697b95fc7b5e46aa619
                              • Instruction ID: 6c30ffe4bf84af5a2d0a3a58ae3a7978f390e2288b6bcedd66af0f2504637465
                              • Opcode Fuzzy Hash: 90479eef3df0e1eb02a2e6eea9e591ca1a4f717c6add4697b95fc7b5e46aa619
                              • Instruction Fuzzy Hash: 0BD01235140318B7DE202FA2EC1FF493E1AEF59750F408020BA04291D3CAB16820B598
                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0054A12A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 71b0fe2453631d2489a609eb8ba3b08fe3b98062630b84f48b7e2c1c824b2ade
                              • Instruction ID: 9a8aa46c83182d253f6bb61d6a5a35d1e4889da47f0b960f9f52db9211680a3a
                              • Opcode Fuzzy Hash: 71b0fe2453631d2489a609eb8ba3b08fe3b98062630b84f48b7e2c1c824b2ade
                              • Instruction Fuzzy Hash: 00A0113000020CAB8F002B82EC08888BFACEA022A0B008022F80C800228B32A820AA80
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dc47a16ce597f1e286f55862b55d76b1b6bbab2a72c246a5e7e73c127d165436
                              • Instruction ID: 314f91d36d8e7b7345692bfb9027115503a6944b5e4bbc6de0d7b5518328fbbd
                              • Opcode Fuzzy Hash: dc47a16ce597f1e286f55862b55d76b1b6bbab2a72c246a5e7e73c127d165436
                              • Instruction Fuzzy Hash: D1226731504306CBDF3C8A24D494B7CBFA1FB01314F68886BF99A8B592EBB09D81E751
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction ID: e4059703fb47d69df059d79aab8a45f8a2f3636fc346850a95f7063735d3f9f6
                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction Fuzzy Hash: D9C1B7722094A309DF2D463A84341BEFFA17EA27B975A076DE4B3CF0D4EE10C965D620
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction ID: fd5c3defddaa772ad3d6b34977603b855aa6da0416b8542a8da4bc4a81a4b1ff
                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction Fuzzy Hash: 6CC1B2722051A30ADF2D463AC4340BEFEA17EA27F575A076DE4B3DB0D4EE20C964D620
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction ID: e1e2546bbea8450795ef1c1910cbe97db2568aab96fb54a681b587d11ea09f07
                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction Fuzzy Hash: 9EC1C37220589309DF2D463AC4740BEBFA17EA27B931A076DD4B3CB1C4FE20C9A4D624
                              Memory Dump Source
                              • Source File: 00000000.00000002.1700242548.000000000119C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0119C000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_119c000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                              • Instruction ID: e69ff6cea54467d0c00b56276f45642c58dfeb74aece48a966d81bb5470fe841
                              • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                              • Instruction Fuzzy Hash: E641D371D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.1700242548.000000000119C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0119C000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_119c000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                              • Instruction ID: 6d05d0e068537c0737889493224e69f8fdfe480197b3fec4e5b779d5f93836b3
                              • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                              • Instruction Fuzzy Hash: 00014474A11109EFCB58DF98C5909AEFBB5FB48310F208599D81997745D730AE52DB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.1700242548.000000000119C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0119C000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_119c000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                              • Instruction ID: 82dab3d30af94d073f6e2e5b1d925f10e3adef4882242b12d1079a0d13037186
                              • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                              • Instruction Fuzzy Hash: 5C018478A01109EFCB48DF98C5909AEFBB5FB48310F208599D81597741D730AE42DB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.1700242548.000000000119C000.00000040.00000020.00020000.00000000.sdmp, Offset: 0119C000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_119c000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                              • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                              • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                              • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                              APIs
                              • DeleteObject.GDI32(00000000), ref: 0059785B
                              • DeleteObject.GDI32(00000000), ref: 0059786D
                              • DestroyWindow.USER32 ref: 0059787B
                              • GetDesktopWindow.USER32 ref: 00597895
                              • GetWindowRect.USER32(00000000), ref: 0059789C
                              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 005979DD
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 005979ED
                              • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00597A35
                              • GetClientRect.USER32(00000000,?), ref: 00597A41
                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00597A7B
                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00597A9D
                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00597AB0
                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00597ABB
                              • GlobalLock.KERNEL32(00000000), ref: 00597AC4
                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00597AD3
                              • GlobalUnlock.KERNEL32(00000000), ref: 00597ADC
                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00597AE3
                              • GlobalFree.KERNEL32(00000000), ref: 00597AEE
                              • CreateStreamOnHGlobal.COMBASE(00000000,00000001,88C00000), ref: 00597B00
                              • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,005B2CAC,00000000), ref: 00597B16
                              • GlobalFree.KERNEL32(00000000), ref: 00597B26
                              • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00597B4C
                              • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00597B6B
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00597B8D
                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00597D7A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                              • String ID: $AutoIt v3$DISPLAY$static
                              • API String ID: 2211948467-2373415609
                              • Opcode ID: b446930cb7440ff12b52caec804061e70a1c0e7c9d6b46bcaf79e3263e2227de
                              • Instruction ID: 3256243d692e19a16aa55973c86d643d90abd604beb13bdb0325275db67bdd59
                              • Opcode Fuzzy Hash: b446930cb7440ff12b52caec804061e70a1c0e7c9d6b46bcaf79e3263e2227de
                              • Instruction Fuzzy Hash: 45026775910219AFDB14DFA4DC89EAE7FB9FF49310F048169F905AB2A1CB30AD05DB60
                              APIs
                              • CharUpperBuffW.USER32(?,?,005AF910), ref: 005A3627
                              • IsWindowVisible.USER32(?), ref: 005A364B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: BuffCharUpperVisibleWindow
                              • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                              • API String ID: 4105515805-45149045
                              • Opcode ID: 7244f2d0e9452d9af330580135b8c8fb82f0c97e3e5d4a0b866b5f2f38aec2cd
                              • Instruction ID: 041a7856e2be75a15c678cc10167159878415a694716770ef3fca28d5502d60e
                              • Opcode Fuzzy Hash: 7244f2d0e9452d9af330580135b8c8fb82f0c97e3e5d4a0b866b5f2f38aec2cd
                              • Instruction Fuzzy Hash: 95D171302043129BCB14EF14D459A6E7FE5BF96358F144859F88A5B3E2DB31DE4ACB81
                              APIs
                              • SetTextColor.GDI32(?,00000000), ref: 005AA630
                              • GetSysColorBrush.USER32(0000000F), ref: 005AA661
                              • GetSysColor.USER32(0000000F), ref: 005AA66D
                              • SetBkColor.GDI32(?,000000FF), ref: 005AA687
                              • SelectObject.GDI32(?,00000000), ref: 005AA696
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 005AA6C1
                              • GetSysColor.USER32(00000010), ref: 005AA6C9
                              • CreateSolidBrush.GDI32(00000000), ref: 005AA6D0
                              • FrameRect.USER32(?,?,00000000), ref: 005AA6DF
                              • DeleteObject.GDI32(00000000), ref: 005AA6E6
                              • InflateRect.USER32(?,000000FE,000000FE), ref: 005AA731
                              • FillRect.USER32(?,?,00000000), ref: 005AA763
                              • GetWindowLongW.USER32(?,000000F0), ref: 005AA78E
                                • Part of subcall function 005AA8CA: GetSysColor.USER32(00000012), ref: 005AA903
                                • Part of subcall function 005AA8CA: SetTextColor.GDI32(?,?), ref: 005AA907
                                • Part of subcall function 005AA8CA: GetSysColorBrush.USER32(0000000F), ref: 005AA91D
                                • Part of subcall function 005AA8CA: GetSysColor.USER32(0000000F), ref: 005AA928
                                • Part of subcall function 005AA8CA: GetSysColor.USER32(00000011), ref: 005AA945
                                • Part of subcall function 005AA8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 005AA953
                                • Part of subcall function 005AA8CA: SelectObject.GDI32(?,00000000), ref: 005AA964
                                • Part of subcall function 005AA8CA: SetBkColor.GDI32(?,00000000), ref: 005AA96D
                                • Part of subcall function 005AA8CA: SelectObject.GDI32(?,?), ref: 005AA97A
                                • Part of subcall function 005AA8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 005AA999
                                • Part of subcall function 005AA8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 005AA9B0
                                • Part of subcall function 005AA8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 005AA9C5
                                • Part of subcall function 005AA8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 005AA9ED
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                              • String ID:
                              • API String ID: 3521893082-0
                              • Opcode ID: ab8eb8e6cc2add9eb603c06ecb81d6d3fa30122d94528df0739dd43da0b9a9cd
                              • Instruction ID: f1019debf8864956dccf73e3c815820f9af7cffd1492cb802e519387d4fe484b
                              • Opcode Fuzzy Hash: ab8eb8e6cc2add9eb603c06ecb81d6d3fa30122d94528df0739dd43da0b9a9cd
                              • Instruction Fuzzy Hash: 6B918D72408301FFC7109FA4DC08A5FBBA9FF8A321F100B29F9A2961A0D731D948DB52
                              APIs
                              • DestroyWindow.USER32(00000000), ref: 005974DE
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0059759D
                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 005975DB
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 005975ED
                              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00597633
                              • GetClientRect.USER32(00000000,?), ref: 0059763F
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00597683
                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00597692
                              • GetStockObject.GDI32(00000011), ref: 005976A2
                              • SelectObject.GDI32(00000000,00000000), ref: 005976A6
                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 005976B6
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 005976BF
                              • DeleteDC.GDI32(00000000), ref: 005976C8
                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 005976F4
                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 0059770B
                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00597746
                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0059775A
                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 0059776B
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0059779B
                              • GetStockObject.GDI32(00000011), ref: 005977A6
                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 005977B1
                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 005977BB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                              • API String ID: 2910397461-517079104
                              • Opcode ID: b5afad3c39cabb445c7194c70ceb79bba21f3be7ef59042263150d51de419980
                              • Instruction ID: 885bcfbde5309e47a562b136e23c7519cedd155749c53ed53890dfa4357e79f0
                              • Opcode Fuzzy Hash: b5afad3c39cabb445c7194c70ceb79bba21f3be7ef59042263150d51de419980
                              • Instruction Fuzzy Hash: 4FA19C71A00219BFEB14DBA4DC8AFAE7BB9FF09714F004115FA04AB2E0D670AD04DB64
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0058AD1E
                              • GetDriveTypeW.KERNEL32(?,005AFAC0,?,\\.\,005AF910), ref: 0058ADFB
                              • SetErrorMode.KERNEL32(00000000,005AFAC0,?,\\.\,005AF910), ref: 0058AF59
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ErrorMode$DriveType
                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                              • API String ID: 2907320926-4222207086
                              • Opcode ID: d8f5a081f988357b4c2a6b9c25b57c2753cdd444e5b5d04b5d963d0a6e234736
                              • Instruction ID: 5c45f29b2daf725612b62c5b85dbd4a18377f0f76cdac0d26183bf20556ff7e5
                              • Opcode Fuzzy Hash: d8f5a081f988357b4c2a6b9c25b57c2753cdd444e5b5d04b5d963d0a6e234736
                              • Instruction Fuzzy Hash: F851A3B8644206ABAB20FB54C986CBD7FA0FF49710B244857ED07B73D0EA709D41EB42
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                              • API String ID: 1038674560-86951937
                              • Opcode ID: 61fced25035d64b2280b703818c95f88a87ccc9dd32e38f52e44826a9a24e831
                              • Instruction ID: 17c1b7b755a1b86a19e1f5084862d32de6d6be70d9dc0e996196fa2aa06f0bf7
                              • Opcode Fuzzy Hash: 61fced25035d64b2280b703818c95f88a87ccc9dd32e38f52e44826a9a24e831
                              • Instruction Fuzzy Hash: 5C8127B0600226AACF25AB60FC57FAE3F68FF46704F044025FD456A1D6EB71EE45C261
                              APIs
                              • DestroyWindow.USER32(?,?,?), ref: 00522CA2
                              • DeleteObject.GDI32(00000000), ref: 00522CE8
                              • DeleteObject.GDI32(00000000), ref: 00522CF3
                              • DestroyCursor.USER32(00000000), ref: 00522CFE
                              • DestroyWindow.USER32(00000000,?,?,?), ref: 00522D09
                              • SendMessageW.USER32(?,00001308,?,00000000), ref: 0055C43B
                              • 6F550200.COMCTL32(?,000000FF,?), ref: 0055C474
                              • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 0055C89D
                                • Part of subcall function 00521B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00522036,?,00000000,?,?,?,?,005216CB,00000000,?), ref: 00521B9A
                              • SendMessageW.USER32(?,00001053), ref: 0055C8DA
                              • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 0055C8F1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: DestroyMessageSendWindow$DeleteObject$CursorF550200InvalidateMoveRect
                              • String ID: 0
                              • API String ID: 2586706302-4108050209
                              • Opcode ID: 98f7eccf9e9bdf95b59780eecf6f5ee5965dfca762ed597696c4966fd9466c13
                              • Instruction ID: f00e028a6f410988a299ef94643b0bd78cfebcab90beaca7f9098883219dd743
                              • Opcode Fuzzy Hash: 98f7eccf9e9bdf95b59780eecf6f5ee5965dfca762ed597696c4966fd9466c13
                              • Instruction Fuzzy Hash: 90129E34504211EFDB10CF24D898BA9BFE1FF4A312F54456AE885DB6A2C731EC4ADB91
                              APIs
                              • GetSysColor.USER32(00000012), ref: 005AA903
                              • SetTextColor.GDI32(?,?), ref: 005AA907
                              • GetSysColorBrush.USER32(0000000F), ref: 005AA91D
                              • GetSysColor.USER32(0000000F), ref: 005AA928
                              • CreateSolidBrush.GDI32(?), ref: 005AA92D
                              • GetSysColor.USER32(00000011), ref: 005AA945
                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 005AA953
                              • SelectObject.GDI32(?,00000000), ref: 005AA964
                              • SetBkColor.GDI32(?,00000000), ref: 005AA96D
                              • SelectObject.GDI32(?,?), ref: 005AA97A
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 005AA999
                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 005AA9B0
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 005AA9C5
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 005AA9ED
                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 005AAA14
                              • InflateRect.USER32(?,000000FD,000000FD), ref: 005AAA32
                              • DrawFocusRect.USER32(?,?), ref: 005AAA3D
                              • GetSysColor.USER32(00000011), ref: 005AAA4B
                              • SetTextColor.GDI32(?,00000000), ref: 005AAA53
                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 005AAA67
                              • SelectObject.GDI32(?,005AA5FA), ref: 005AAA7E
                              • DeleteObject.GDI32(?), ref: 005AAA89
                              • SelectObject.GDI32(?,?), ref: 005AAA8F
                              • DeleteObject.GDI32(?), ref: 005AAA94
                              • SetTextColor.GDI32(?,?), ref: 005AAA9A
                              • SetBkColor.GDI32(?,?), ref: 005AAAA4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                              • String ID:
                              • API String ID: 1996641542-0
                              • Opcode ID: 806c70f292efe176e8329fd7454b7e6e55d6ee1f772a7c92348bedf0996ebfba
                              • Instruction ID: d21644c7261e7d767881a56424440afe342e29b6ba329bd8d6b6ecf1fc460f50
                              • Opcode Fuzzy Hash: 806c70f292efe176e8329fd7454b7e6e55d6ee1f772a7c92348bedf0996ebfba
                              • Instruction Fuzzy Hash: 95511B71900208EFDB119FA4DC48EAEBBB9FB4A320F114625FA11AB2A1D7759944DB90
                              APIs
                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 005A8AC1
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 005A8AD2
                              • CharNextW.USER32(0000014E), ref: 005A8B01
                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 005A8B42
                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 005A8B58
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 005A8B69
                              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 005A8B86
                              • SetWindowTextW.USER32(?,0000014E), ref: 005A8BD8
                              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 005A8BEE
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 005A8C1F
                              • _memset.LIBCMT ref: 005A8C44
                              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 005A8C8D
                              • _memset.LIBCMT ref: 005A8CEC
                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 005A8D16
                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 005A8D6E
                              • SendMessageW.USER32(?,0000133D,?,?), ref: 005A8E1B
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 005A8E3D
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 005A8E87
                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 005A8EB4
                              • DrawMenuBar.USER32(?), ref: 005A8EC3
                              • SetWindowTextW.USER32(?,0000014E), ref: 005A8EEB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                              • String ID: 0
                              • API String ID: 1073566785-4108050209
                              • Opcode ID: 1cbd7281c3e18f58957105c6784425f858359bbe22712cc47bf7d7f82d80d07d
                              • Instruction ID: 49c0c40b66ab40ff8c7a380dcb0a7b6e461769ff0b82c0a35d4aff90f267644b
                              • Opcode Fuzzy Hash: 1cbd7281c3e18f58957105c6784425f858359bbe22712cc47bf7d7f82d80d07d
                              • Instruction Fuzzy Hash: 20E15E70900219AFDB209F60CC88EFE7FB9FF4A720F148156F915AA291DB749984DF60
                              APIs
                              • GetCursorPos.USER32(?), ref: 005A49CA
                              • GetDesktopWindow.USER32 ref: 005A49DF
                              • GetWindowRect.USER32(00000000), ref: 005A49E6
                              • GetWindowLongW.USER32(?,000000F0), ref: 005A4A48
                              • DestroyWindow.USER32(?), ref: 005A4A74
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 005A4A9D
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 005A4ABB
                              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 005A4AE1
                              • SendMessageW.USER32(?,00000421,?,?), ref: 005A4AF6
                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 005A4B09
                              • IsWindowVisible.USER32(?), ref: 005A4B29
                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 005A4B44
                              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 005A4B58
                              • GetWindowRect.USER32(?,?), ref: 005A4B70
                              • MonitorFromPoint.USER32(?,?,00000002), ref: 005A4B96
                              • GetMonitorInfoW.USER32(00000000,?), ref: 005A4BB0
                              • CopyRect.USER32(?,?), ref: 005A4BC7
                              • SendMessageW.USER32(?,00000412,00000000), ref: 005A4C32
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                              • String ID: ($0$tooltips_class32
                              • API String ID: 698492251-4156429822
                              • Opcode ID: 76cc17e3cfc4dc33a0d4e3330bcd9deaf284b496942d1fdfd87f3319ab834982
                              • Instruction ID: 209f79d19a697afe975315c08383706fc4a9c5b2e0efd297f206e9031b687206
                              • Opcode Fuzzy Hash: 76cc17e3cfc4dc33a0d4e3330bcd9deaf284b496942d1fdfd87f3319ab834982
                              • Instruction Fuzzy Hash: 15B17A71608351AFDB04DFA4D848B6EBBE5BF8A310F008918F5999B2A1D7B0EC05CF95
                              APIs
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005228BC
                              • GetSystemMetrics.USER32(00000007), ref: 005228C4
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 005228EF
                              • GetSystemMetrics.USER32(00000008), ref: 005228F7
                              • GetSystemMetrics.USER32(00000004), ref: 0052291C
                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00522939
                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00522949
                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0052297C
                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00522990
                              • GetClientRect.USER32(00000000,000000FF), ref: 005229AE
                              • GetStockObject.GDI32(00000011), ref: 005229CA
                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 005229D5
                                • Part of subcall function 00522344: GetCursorPos.USER32(?), ref: 00522357
                                • Part of subcall function 00522344: ScreenToClient.USER32(005E57B0,?), ref: 00522374
                                • Part of subcall function 00522344: GetAsyncKeyState.USER32(00000001), ref: 00522399
                                • Part of subcall function 00522344: GetAsyncKeyState.USER32(00000002), ref: 005223A7
                              • SetTimer.USER32(00000000,00000000,00000028,00521256), ref: 005229FC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                              • String ID: AutoIt v3 GUI
                              • API String ID: 1458621304-248962490
                              • Opcode ID: 5ff1c99ab07f45066c907d06e1a51c1f262304e2d04c15a0e150da301df660d1
                              • Instruction ID: 55703e308f3b719a3d91ba0c7df16f9feed0cd97429f1176901b69bafabe7a39
                              • Opcode Fuzzy Hash: 5ff1c99ab07f45066c907d06e1a51c1f262304e2d04c15a0e150da301df660d1
                              • Instruction Fuzzy Hash: 38B1AE75A0021AEFDB14DFA8DC89BAD7FA4FF19315F104229FA15A72E0DB709844DB50
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                              • String ID: {nT${nT
                              • API String ID: 884005220-1826762898
                              • Opcode ID: 11ff670d14cb6ca50e957224486fa8866230a22e2c6de296eb0b063099a5c813
                              • Instruction ID: 52a9bca3170aa09a30d94a37ae51429bf3d4f08df83db3b4099c4b8537da0ffc
                              • Opcode Fuzzy Hash: 11ff670d14cb6ca50e957224486fa8866230a22e2c6de296eb0b063099a5c813
                              • Instruction Fuzzy Hash: E8610472900222AFDB245F24DC597AD7FB4FF90326F21471BEC41AB191EB349949CB92
                              APIs
                              • GetClassNameW.USER32(?,?,00000100), ref: 0057A47A
                              • __swprintf.LIBCMT ref: 0057A51B
                              • _wcscmp.LIBCMT ref: 0057A52E
                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 0057A583
                              • _wcscmp.LIBCMT ref: 0057A5BF
                              • GetClassNameW.USER32(?,?,00000400), ref: 0057A5F6
                              • GetDlgCtrlID.USER32(?), ref: 0057A648
                              • GetWindowRect.USER32(?,?), ref: 0057A67E
                              • GetParent.USER32(?), ref: 0057A69C
                              • ScreenToClient.USER32(00000000), ref: 0057A6A3
                              • GetClassNameW.USER32(?,?,00000100), ref: 0057A71D
                              • _wcscmp.LIBCMT ref: 0057A731
                              • GetWindowTextW.USER32(?,?,00000400), ref: 0057A757
                              • _wcscmp.LIBCMT ref: 0057A76B
                                • Part of subcall function 0054362C: _iswctype.LIBCMT ref: 00543634
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                              • String ID: %s%u
                              • API String ID: 3744389584-679674701
                              • Opcode ID: 5f42c0919d992be74b205f7ae146024b74ff3f6708a84ef7e137fb64f4ec57a7
                              • Instruction ID: 16deebe273df3b46a13b5eb081cca27aef81e92b62641f8df618d1385a054c7e
                              • Opcode Fuzzy Hash: 5f42c0919d992be74b205f7ae146024b74ff3f6708a84ef7e137fb64f4ec57a7
                              • Instruction Fuzzy Hash: CCA1C331204607AFDB19DF64D888BAEBBE8FF84315F008529F99DD2190DB30E945DB92
                              APIs
                              • GetClassNameW.USER32(00000008,?,00000400), ref: 0057AF18
                              • _wcscmp.LIBCMT ref: 0057AF29
                              • GetWindowTextW.USER32(00000001,?,00000400), ref: 0057AF51
                              • CharUpperBuffW.USER32(?,00000000), ref: 0057AF6E
                              • _wcscmp.LIBCMT ref: 0057AF8C
                              • _wcsstr.LIBCMT ref: 0057AF9D
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 0057AFD5
                              • _wcscmp.LIBCMT ref: 0057AFE5
                              • GetWindowTextW.USER32(00000002,?,00000400), ref: 0057B00C
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 0057B055
                              • _wcscmp.LIBCMT ref: 0057B065
                              • GetClassNameW.USER32(00000010,?,00000400), ref: 0057B08D
                              • GetWindowRect.USER32(00000004,?), ref: 0057B0F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                              • String ID: @$ThumbnailClass
                              • API String ID: 1788623398-1539354611
                              • Opcode ID: 04da4a775bd1d5250819e546516bcbfb1504fa5aeaa9321c06b08760635c95dc
                              • Instruction ID: e8a28fd46151d89127e2d69c758e6b0db4d2b84d8dcf54549078acbe9333903c
                              • Opcode Fuzzy Hash: 04da4a775bd1d5250819e546516bcbfb1504fa5aeaa9321c06b08760635c95dc
                              • Instruction Fuzzy Hash: 5F819F711082069FEB05DF14D889BAA7FE8FF94314F04C46AFD898A095DB34DD49DB61
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                              • API String ID: 1038674560-1810252412
                              • Opcode ID: 99ad973899e49c02dedd4b7a6e241f849605ba29ed4d3ed301b2037144c57a07
                              • Instruction ID: 43517d8780ed38235c007264d4d0b737f14b5565c7e2c7dd5cf3758d3596ca1a
                              • Opcode Fuzzy Hash: 99ad973899e49c02dedd4b7a6e241f849605ba29ed4d3ed301b2037144c57a07
                              • Instruction Fuzzy Hash: 8D31D03194821EBADB20EA64ED0BEEE7F68BF99710F60441AF405711E1FB616F04D652
                              APIs
                              • LoadCursorW.USER32(00000000,00007F8A), ref: 00595013
                              • LoadCursorW.USER32(00000000,00007F00), ref: 0059501E
                              • LoadCursorW.USER32(00000000,00007F03), ref: 00595029
                              • LoadCursorW.USER32(00000000,00007F8B), ref: 00595034
                              • LoadCursorW.USER32(00000000,00007F01), ref: 0059503F
                              • LoadCursorW.USER32(00000000,00007F81), ref: 0059504A
                              • LoadCursorW.USER32(00000000,00007F88), ref: 00595055
                              • LoadCursorW.USER32(00000000,00007F80), ref: 00595060
                              • LoadCursorW.USER32(00000000,00007F86), ref: 0059506B
                              • LoadCursorW.USER32(00000000,00007F83), ref: 00595076
                              • LoadCursorW.USER32(00000000,00007F85), ref: 00595081
                              • LoadCursorW.USER32(00000000,00007F82), ref: 0059508C
                              • LoadCursorW.USER32(00000000,00007F84), ref: 00595097
                              • LoadCursorW.USER32(00000000,00007F04), ref: 005950A2
                              • LoadCursorW.USER32(00000000,00007F02), ref: 005950AD
                              • LoadCursorW.USER32(00000000,00007F89), ref: 005950B8
                              • GetCursorInfo.USER32(?), ref: 005950C8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Cursor$Load$Info
                              • String ID:
                              • API String ID: 2577412497-0
                              • Opcode ID: 114971032146c6b394b6362e16547d9d5b5e159db0e474708b8b6173fe456e1e
                              • Instruction ID: 3eee51cdcd308bc944f0c6d505540c831e081817b73025fcecc825d264335eb4
                              • Opcode Fuzzy Hash: 114971032146c6b394b6362e16547d9d5b5e159db0e474708b8b6173fe456e1e
                              • Instruction Fuzzy Hash: 6531F4B1D4831A6ADF109FB68C8995EBFE8FF04750F50453AE54DE7280EA786504CF91
                              APIs
                              • _memset.LIBCMT ref: 005AA259
                              • DestroyWindow.USER32(?,?), ref: 005AA2D3
                                • Part of subcall function 00527BCC: _memmove.LIBCMT ref: 00527C06
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 005AA34D
                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 005AA36F
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 005AA382
                              • DestroyWindow.USER32(00000000), ref: 005AA3A4
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00520000,00000000), ref: 005AA3DB
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 005AA3F4
                              • GetDesktopWindow.USER32 ref: 005AA40D
                              • GetWindowRect.USER32(00000000), ref: 005AA414
                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 005AA42C
                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 005AA444
                                • Part of subcall function 005225DB: GetWindowLongW.USER32(?,000000EB), ref: 005225EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                              • String ID: 0$tooltips_class32
                              • API String ID: 1297703922-3619404913
                              • Opcode ID: dcf753e95404e01d0d08261883746803462a4989a4be7217f8d39abbb213a932
                              • Instruction ID: 7243ffaa9d6e52ef286e4604c97ca5121ce4d2aa1cff88eb94dbe9a9f0c7611c
                              • Opcode Fuzzy Hash: dcf753e95404e01d0d08261883746803462a4989a4be7217f8d39abbb213a932
                              • Instruction Fuzzy Hash: 6371CF71140245AFDB25CF28CC49F6A7BE6FB9E304F04492DF9858B2A0E770E906DB52
                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 005A4424
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 005A446F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: BuffCharMessageSendUpper
                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                              • API String ID: 3974292440-4258414348
                              • Opcode ID: bbc0c51aa94040c3edcdeed38f7805f8a8f5848c2e987d2ca01bf55ed8745151
                              • Instruction ID: ed0bf2c0d549ad2734f09e8226d2ff0bcd30298dc0b0c8beb20960bbfd437784
                              • Opcode Fuzzy Hash: bbc0c51aa94040c3edcdeed38f7805f8a8f5848c2e987d2ca01bf55ed8745151
                              • Instruction Fuzzy Hash: F29179712043129BCB08EF60D455A6EBFE1BFD6354F148869F8965B3A2CB70ED09CB91
                              APIs
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 005AB8B4
                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,005A6B11,?), ref: 005AB910
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 005AB949
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 005AB98C
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 005AB9C3
                              • FreeLibrary.KERNEL32(?), ref: 005AB9CF
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 005AB9DF
                              • DestroyCursor.USER32(?), ref: 005AB9EE
                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 005ABA0B
                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 005ABA17
                                • Part of subcall function 00542EFD: __wcsicmp_l.LIBCMT ref: 00542F86
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Load$Image$LibraryMessageSend$CursorDestroyExtractFreeIcon__wcsicmp_l
                              • String ID: .dll$.exe$.icl
                              • API String ID: 3907162815-1154884017
                              • Opcode ID: 88c26aa1ba96fbf7be92acb31b09922afbefff8cb8019ed2129560a122a9b930
                              • Instruction ID: b9922f2316604494b025e814685c35332cee6e4928de846ac0e707b2ac0d16f0
                              • Opcode Fuzzy Hash: 88c26aa1ba96fbf7be92acb31b09922afbefff8cb8019ed2129560a122a9b930
                              • Instruction Fuzzy Hash: A361EB7190022ABEFB14DF64CC45BBE7BA8FF0A710F104516FA15D61C2DB749990DBA0
                              APIs
                                • Part of subcall function 00529837: __itow.LIBCMT ref: 00529862
                                • Part of subcall function 00529837: __swprintf.LIBCMT ref: 005298AC
                              • CharLowerBuffW.USER32(?,?), ref: 0058A3CB
                              • GetDriveTypeW.KERNEL32 ref: 0058A418
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0058A460
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0058A497
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0058A4C5
                                • Part of subcall function 00527BCC: _memmove.LIBCMT ref: 00527C06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                              • API String ID: 2698844021-4113822522
                              • Opcode ID: 4bf812f87fa71787e117d38c7b50885fe15bcc51fc7ccc30ab431477a77f1f22
                              • Instruction ID: c07a4b8d146265556b37f47743011f3811db6e4f0dc2b7f261018402722d0984
                              • Opcode Fuzzy Hash: 4bf812f87fa71787e117d38c7b50885fe15bcc51fc7ccc30ab431477a77f1f22
                              • Instruction Fuzzy Hash: 68516D711043169FC700EF24D89596ABBE4FF99718F14486EF889673A1DB31ED09CB92
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,0055E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 0057F8DF
                              • LoadStringW.USER32(00000000,?,0055E029,00000001), ref: 0057F8E8
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,0055E029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 0057F90A
                              • LoadStringW.USER32(00000000,?,0055E029,00000001), ref: 0057F90D
                              • __swprintf.LIBCMT ref: 0057F95D
                              • __swprintf.LIBCMT ref: 0057F96E
                              • _wprintf.LIBCMT ref: 0057FA17
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0057FA2E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                              • API String ID: 984253442-2268648507
                              • Opcode ID: 2399872ea7f02555611a53a6bf8463cff1896cf897856169d7a937beafdd9e7c
                              • Instruction ID: 92202e55374f73ea10677c6cf3d6439690e42688b871794dab97be28e2239ba8
                              • Opcode Fuzzy Hash: 2399872ea7f02555611a53a6bf8463cff1896cf897856169d7a937beafdd9e7c
                              • Instruction Fuzzy Hash: ED413D7280451EAACF14FFE4ED8ADEE7B78BF99300F100065B509761A1EA316F49DB60
                              APIs
                                • Part of subcall function 00540957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00526B0C,?,00008000), ref: 00540973
                                • Part of subcall function 00524750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00524743,?,?,005237AE,?), ref: 00524770
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00526BAD
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00526CFA
                                • Part of subcall function 0052586D: _wcscpy.LIBCMT ref: 005258A5
                                • Part of subcall function 0054363D: _iswctype.LIBCMT ref: 00543645
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                              • String ID: #include depth exceeded. Make sure there are no recursive includes$/vR$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                              • API String ID: 537147316-3104249712
                              • Opcode ID: 31dc66eae2775b3e78f975a590d8978c3db0c06211e17248bfacf23aa4528483
                              • Instruction ID: a12bc844026122a87a5856ac8edb6a31930c0e4ae3eaafd9bfadadbea3925316
                              • Opcode Fuzzy Hash: 31dc66eae2775b3e78f975a590d8978c3db0c06211e17248bfacf23aa4528483
                              • Instruction Fuzzy Hash: D70279301083529FC714EF24D8959AEBFE5BFDA354F10481EF889972A1EB30DA49CB52
                              APIs
                              • __wsplitpath.LIBCMT ref: 0058DA10
                              • _wcscat.LIBCMT ref: 0058DA28
                              • _wcscat.LIBCMT ref: 0058DA3A
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 0058DA4F
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0058DA63
                              • GetFileAttributesW.KERNEL32(?), ref: 0058DA7B
                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 0058DA95
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 0058DAA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                              • String ID: *.*
                              • API String ID: 34673085-438819550
                              • Opcode ID: 29f2edb41552b7fa136145782703a854bdb6e4d949ffc45298b4cd69d85ce05b
                              • Instruction ID: 2beffe319466679b906b6302fd85d24425e9712c0beee90b9e79a4b361292792
                              • Opcode Fuzzy Hash: 29f2edb41552b7fa136145782703a854bdb6e4d949ffc45298b4cd69d85ce05b
                              • Instruction Fuzzy Hash: 268161725042459FCB64EF64C845AAABBF4BF89314F184C2EFC89E7291E630D945CB62
                              APIs
                              • GetDC.USER32(00000000), ref: 0059738F
                              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0059739B
                              • CreateCompatibleDC.GDI32(?), ref: 005973A7
                              • SelectObject.GDI32(00000000,?), ref: 005973B4
                              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00597408
                              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00597444
                              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00597468
                              • SelectObject.GDI32(00000006,?), ref: 00597470
                              • DeleteObject.GDI32(?), ref: 00597479
                              • DeleteDC.GDI32(00000006), ref: 00597480
                              • ReleaseDC.USER32(00000000,?), ref: 0059748B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                              • String ID: (
                              • API String ID: 2598888154-3887548279
                              • Opcode ID: 61b7f5fe50141cec2eb6b5120985cecfdb3a1fc407ae8a81aee59a1ebc347bcf
                              • Instruction ID: f165bf2ab0bce77d9b6f664bee46c23d26ba4c9660621dc4d82017142a1d8549
                              • Opcode Fuzzy Hash: 61b7f5fe50141cec2eb6b5120985cecfdb3a1fc407ae8a81aee59a1ebc347bcf
                              • Instruction Fuzzy Hash: 8D513975904209EFCB14CFA8CC89EAEBBB9FF49310F14852EF95A97211C731A944DB50
                              APIs
                              • _memset.LIBCMT ref: 00582D50
                              • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00582DDD
                              • GetMenuItemCount.USER32(005E5890), ref: 00582E66
                              • DeleteMenu.USER32(005E5890,00000005,00000000,000000F5,?,?), ref: 00582EF6
                              • DeleteMenu.USER32(005E5890,00000004,00000000), ref: 00582EFE
                              • DeleteMenu.USER32(005E5890,00000006,00000000), ref: 00582F06
                              • DeleteMenu.USER32(005E5890,00000003,00000000), ref: 00582F0E
                              • GetMenuItemCount.USER32(005E5890), ref: 00582F16
                              • SetMenuItemInfoW.USER32(005E5890,00000004,00000000,00000030), ref: 00582F4C
                              • GetCursorPos.USER32(?), ref: 00582F56
                              • SetForegroundWindow.USER32(00000000), ref: 00582F5F
                              • TrackPopupMenuEx.USER32(005E5890,00000000,?,00000000,00000000,00000000), ref: 00582F72
                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00582F7E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                              • String ID:
                              • API String ID: 3993528054-0
                              • Opcode ID: 20bb3f7bdd550840d5be90a7dfdcfc82ba19621405f116f91ac41e817899d418
                              • Instruction ID: b8d22ed5ae36641d4c8bfafda6df93e3258d1273b122b3f8d61160152f47b2a8
                              • Opcode Fuzzy Hash: 20bb3f7bdd550840d5be90a7dfdcfc82ba19621405f116f91ac41e817899d418
                              • Instruction Fuzzy Hash: 23710770601206BFEB21AF54DC8AFAABF68FF45324F140216FA25BA1E1C7B15C50DB95
                              APIs
                                • Part of subcall function 00527BCC: _memmove.LIBCMT ref: 00527C06
                              • _memset.LIBCMT ref: 0057786B
                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 005778A0
                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 005778BC
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 005778D8
                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00577902
                              • CLSIDFromString.COMBASE(?,?), ref: 0057792A
                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00577935
                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0057793A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                              • API String ID: 1411258926-22481851
                              • Opcode ID: 419a6e5339715c0a05bac3db0594a736a1cbc2d4a782f95e4ade3802a685d6a7
                              • Instruction ID: 17913b7457300c286b095e2a944ec807f3f0ae4a6cbb83192515cc68fe10e2d3
                              • Opcode Fuzzy Hash: 419a6e5339715c0a05bac3db0594a736a1cbc2d4a782f95e4ade3802a685d6a7
                              • Instruction Fuzzy Hash: 2B41F97281462EAACB21EFA4EC59DEDBB78FF59710F40442AE905A21A1EA305D05DB90
                              APIs
                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0059FDAD,?,?), ref: 005A0E31
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                              • API String ID: 3964851224-909552448
                              • Opcode ID: 51d4b1c1d304ebeacb846a16bdc271812cd594cad0d9b5bc1b41cf315077099f
                              • Instruction ID: 66c5959bbd3c6f688128eab30a5d0785e47a8bdc6da10e04950bfa31d6612a28
                              • Opcode Fuzzy Hash: 51d4b1c1d304ebeacb846a16bdc271812cd594cad0d9b5bc1b41cf315077099f
                              • Instruction Fuzzy Hash: CD416D3115024A8FCF20EF14D869AEE3FA4BF56344F141456FC552B2D2DB309D5ACBA0
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,0055E2A0,00000010,?,Bad directive syntax error,005AF910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 0057F7C2
                              • LoadStringW.USER32(00000000,?,0055E2A0,00000010), ref: 0057F7C9
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                              • _wprintf.LIBCMT ref: 0057F7FC
                              • __swprintf.LIBCMT ref: 0057F81E
                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0057F88D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                              • API String ID: 1506413516-4153970271
                              • Opcode ID: 137924dce9b3113aa011b434696bed03f575f269a73f828a10adeaec2356b627
                              • Instruction ID: 8f4321abef9280bb0a91e2ab5f3ac3ccb70eee8356ba43a5455bc34f4453947e
                              • Opcode Fuzzy Hash: 137924dce9b3113aa011b434696bed03f575f269a73f828a10adeaec2356b627
                              • Instruction Fuzzy Hash: 59216D3294021EABCF11EFA0DC4AEFE7F39BF19300F044466B509661A1EA719A18DB51
                              APIs
                                • Part of subcall function 00527BCC: _memmove.LIBCMT ref: 00527C06
                                • Part of subcall function 00527924: _memmove.LIBCMT ref: 005279AD
                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00585330
                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00585346
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00585357
                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00585369
                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0058537A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: SendString$_memmove
                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                              • API String ID: 2279737902-1007645807
                              • Opcode ID: a3850df5b622c6a40f7763683af2c833d614efb2752a2e7474294949344ceb1c
                              • Instruction ID: 6fcee9585e32d8cacbc0ceaeafc2562cc49efcddc7a80dffb479e52d8af7f8c1
                              • Opcode Fuzzy Hash: a3850df5b622c6a40f7763683af2c833d614efb2752a2e7474294949344ceb1c
                              • Instruction Fuzzy Hash: 78115E21A5022E79D720FA75DC4ADFF6E7CFFE6B50F00082AB801A21D1EEA05D45C6A0
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                              • String ID: 0.0.0.0
                              • API String ID: 208665112-3771769585
                              • Opcode ID: 7584c9cd731c1ef66228508ad625d5f8fb83c94797f5c05d4c8ca4fe7f078145
                              • Instruction ID: bcc72cd9e7bf3cf76b840f7d29ffeb0fe5a3cadd75eacfa65d7a448ec7f3d904
                              • Opcode Fuzzy Hash: 7584c9cd731c1ef66228508ad625d5f8fb83c94797f5c05d4c8ca4fe7f078145
                              • Instruction Fuzzy Hash: DD11D5319001166FCB24BB709C4AEEA7FBCFF52715F0401B6F945E60A1EF7499869B50
                              APIs
                              • timeGetTime.WINMM ref: 00584F7A
                                • Part of subcall function 0054049F: timeGetTime.WINMM(?,75C0B400,00530E7B), ref: 005404A3
                              • Sleep.KERNEL32(0000000A), ref: 00584FA6
                              • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 00584FCA
                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00584FEC
                              • SetActiveWindow.USER32 ref: 0058500B
                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00585019
                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00585038
                              • Sleep.KERNEL32(000000FA), ref: 00585043
                              • IsWindow.USER32 ref: 0058504F
                              • EndDialog.USER32(00000000), ref: 00585060
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                              • String ID: BUTTON
                              • API String ID: 1194449130-3405671355
                              • Opcode ID: 9092abfcafcba58806325b15d93f0eef502748b782799d7a7a6708df94e4d253
                              • Instruction ID: ffa22721884a5db56ec3e1cee17fae763711dcfec7e2635cb0a797c88795cf1e
                              • Opcode Fuzzy Hash: 9092abfcafcba58806325b15d93f0eef502748b782799d7a7a6708df94e4d253
                              • Instruction Fuzzy Hash: 16219274600B45AFE7146F60ECCCA363FA9FB75785B441029FA42962B1EB714D08EB61
                              APIs
                                • Part of subcall function 00529837: __itow.LIBCMT ref: 00529862
                                • Part of subcall function 00529837: __swprintf.LIBCMT ref: 005298AC
                              • CoInitialize.OLE32(00000000), ref: 0058D5EA
                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 0058D67D
                              • SHGetDesktopFolder.SHELL32(?), ref: 0058D691
                              • CoCreateInstance.COMBASE(005B2D7C,00000000,00000001,005D8C1C,?), ref: 0058D6DD
                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 0058D74C
                              • CoTaskMemFree.COMBASE(?), ref: 0058D7A4
                              • _memset.LIBCMT ref: 0058D7E1
                              • SHBrowseForFolderW.SHELL32(?), ref: 0058D81D
                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 0058D840
                              • CoTaskMemFree.COMBASE(00000000), ref: 0058D847
                              • CoTaskMemFree.COMBASE(00000000), ref: 0058D87E
                              • CoUninitialize.COMBASE ref: 0058D880
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                              • String ID:
                              • API String ID: 1246142700-0
                              • Opcode ID: ebd54ae403f3a2e620be3bfa49662ef1f7cbe22eee5f6d34637bfbe2b9da49f0
                              • Instruction ID: 13ff002b9915697c59ff190a687883909e72e4c4372bdc4c9b1bdea50ca096ae
                              • Opcode Fuzzy Hash: ebd54ae403f3a2e620be3bfa49662ef1f7cbe22eee5f6d34637bfbe2b9da49f0
                              • Instruction Fuzzy Hash: 0BB1EC75A00119AFDB04DFA4D888DAEBBF9FF49314F148469E909EB261DB30ED45CB50
                              APIs
                              • GetDlgItem.USER32(?,00000001), ref: 0057C283
                              • GetWindowRect.USER32(00000000,?), ref: 0057C295
                              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 0057C2F3
                              • GetDlgItem.USER32(?,00000002), ref: 0057C2FE
                              • GetWindowRect.USER32(00000000,?), ref: 0057C310
                              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 0057C364
                              • GetDlgItem.USER32(?,000003E9), ref: 0057C372
                              • GetWindowRect.USER32(00000000,?), ref: 0057C383
                              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 0057C3C6
                              • GetDlgItem.USER32(?,000003EA), ref: 0057C3D4
                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 0057C3F1
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0057C3FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$ItemMoveRect$Invalidate
                              • String ID:
                              • API String ID: 3096461208-0
                              • Opcode ID: 403eb39349cae5b7faabe8e83214ae170df0ccf13c907fd4ab790a136f3f50c1
                              • Instruction ID: 5493bfe1f64930801864f5411834532026c5c5d64212f611def3d3a88134ea3f
                              • Opcode Fuzzy Hash: 403eb39349cae5b7faabe8e83214ae170df0ccf13c907fd4ab790a136f3f50c1
                              • Instruction Fuzzy Hash: B9514D71B00205ABDB18CFA9DD89AAEBBBAFB98311F14852DF51AD7290D7709D049B10
                              APIs
                                • Part of subcall function 005225DB: GetWindowLongW.USER32(?,000000EB), ref: 005225EC
                              • GetSysColor.USER32(0000000F), ref: 005221D3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ColorLongWindow
                              • String ID:
                              • API String ID: 259745315-0
                              • Opcode ID: b2904e7cb198a4eb21fb46bfa6f403f84ed2e7a1c9078acf1f3f9e0a20feca56
                              • Instruction ID: ba16501cb0f89fbda8ab5c600d45ef11ec4478e6683f5d511513a6842a9ff0a7
                              • Opcode Fuzzy Hash: b2904e7cb198a4eb21fb46bfa6f403f84ed2e7a1c9078acf1f3f9e0a20feca56
                              • Instruction Fuzzy Hash: 22419039100150EADB255F68EC98BB93F66FF17321F184365FE659A1E1C7328C46EB21
                              APIs
                              • CharLowerBuffW.USER32(?,?,005AF910), ref: 0058A90B
                              • GetDriveTypeW.KERNEL32(00000061,005D89A0,00000061), ref: 0058A9D5
                              • _wcscpy.LIBCMT ref: 0058A9FF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: BuffCharDriveLowerType_wcscpy
                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                              • API String ID: 2820617543-1000479233
                              • Opcode ID: 15685862eca9d80360778a561a4fe9590587fd824ffd8de121ae33e9e65d955d
                              • Instruction ID: 0ffc0a2a16a59dae38cd65251550c4d07f8af56812ef1e401c29e3b597fba130
                              • Opcode Fuzzy Hash: 15685862eca9d80360778a561a4fe9590587fd824ffd8de121ae33e9e65d955d
                              • Instruction Fuzzy Hash: 72518A311083029BD314EF14D896AAEBFA5FFC5704F14482EF999672E2DB319909CB93
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __i64tow__itow__swprintf
                              • String ID: %.15g$0x%p$False$True
                              • API String ID: 421087845-2263619337
                              • Opcode ID: 984566b98ce338b908cc5e417fee27922e67b0816271537a2028dedb422a0cf1
                              • Instruction ID: 111cb684d52535c49ca798f1a0a4f275674378d22df452871c124798afe42905
                              • Opcode Fuzzy Hash: 984566b98ce338b908cc5e417fee27922e67b0816271537a2028dedb422a0cf1
                              • Instruction Fuzzy Hash: 1541B571900216AFDB24DF34E85AAB67FE8FF46304F24486FE949D72D1FA3199458B10
                              APIs
                              • _memset.LIBCMT ref: 005A716A
                              • CreateMenu.USER32 ref: 005A7185
                              • SetMenu.USER32(?,00000000), ref: 005A7194
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005A7221
                              • IsMenu.USER32(?), ref: 005A7237
                              • CreatePopupMenu.USER32 ref: 005A7241
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 005A726E
                              • DrawMenuBar.USER32 ref: 005A7276
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                              • String ID: 0$F
                              • API String ID: 176399719-3044882817
                              • Opcode ID: a91d2e5536abf36528611632a109c28d71734e40361a74d2d898d2c8ede4e1d5
                              • Instruction ID: fbc6ccb39c13c58c2edf9451b96a07aac53c34b9bdc02cc36327c8ffc47d81b5
                              • Opcode Fuzzy Hash: a91d2e5536abf36528611632a109c28d71734e40361a74d2d898d2c8ede4e1d5
                              • Instruction Fuzzy Hash: 05412378A01209EFDB20DFA4D988B9ABBB5FF5E310F144028F945A7361D731A914DBA0
                              APIs
                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 005A755E
                              • CreateCompatibleDC.GDI32(00000000), ref: 005A7565
                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 005A7578
                              • SelectObject.GDI32(00000000,00000000), ref: 005A7580
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 005A758B
                              • DeleteDC.GDI32(00000000), ref: 005A7594
                              • GetWindowLongW.USER32(?,000000EC), ref: 005A759E
                              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 005A75B2
                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 005A75BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                              • String ID: static
                              • API String ID: 2559357485-2160076837
                              • Opcode ID: d1d787fcef507af08fd33b174dad49f79e12751693997cabe429280027009268
                              • Instruction ID: c569fc2054bd13ce6aaeba849fa7a87fa9133f2583cfdcf7624c1cd43dafca21
                              • Opcode Fuzzy Hash: d1d787fcef507af08fd33b174dad49f79e12751693997cabe429280027009268
                              • Instruction Fuzzy Hash: 8C314732505219ABDF119FA4DC08FEB3FA9FF1E360F110224FA55A60A0D731D825EBA4
                              APIs
                              • _memset.LIBCMT ref: 00546E3E
                                • Part of subcall function 00548B28: __getptd_noexit.LIBCMT ref: 00548B28
                              • __gmtime64_s.LIBCMT ref: 00546ED7
                              • __gmtime64_s.LIBCMT ref: 00546F0D
                              • __gmtime64_s.LIBCMT ref: 00546F2A
                              • __allrem.LIBCMT ref: 00546F80
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00546F9C
                              • __allrem.LIBCMT ref: 00546FB3
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00546FD1
                              • __allrem.LIBCMT ref: 00546FE8
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00547006
                              • __invoke_watson.LIBCMT ref: 00547077
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                              • String ID:
                              • API String ID: 384356119-0
                              • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                              • Instruction ID: 66263885d2c01860fc948617693a8b64b59aa89a3cf7ff0fac1041ea27f20f23
                              • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                              • Instruction Fuzzy Hash: 2E711672A00717ABD7149E68CC45BEBBBE8BF45368F10452AF818D7281F770ED548B91
                              APIs
                              • _memset.LIBCMT ref: 00582542
                              • GetMenuItemInfoW.USER32(005E5890,000000FF,00000000,00000030), ref: 005825A3
                              • SetMenuItemInfoW.USER32(005E5890,00000004,00000000,00000030), ref: 005825D9
                              • Sleep.KERNEL32(000001F4), ref: 005825EB
                              • GetMenuItemCount.USER32(?), ref: 0058262F
                              • GetMenuItemID.USER32(?,00000000), ref: 0058264B
                              • GetMenuItemID.USER32(?,-00000001), ref: 00582675
                              • GetMenuItemID.USER32(?,?), ref: 005826BA
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00582700
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00582714
                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00582735
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                              • String ID:
                              • API String ID: 4176008265-0
                              • Opcode ID: ec363c3548db267292099f8161e765bea1b527dd5e6eead54c8bc69c333170e8
                              • Instruction ID: a94dbee1e41bdc3a0c431820fde6ce32074ae783075fd099802b7270da581653
                              • Opcode Fuzzy Hash: ec363c3548db267292099f8161e765bea1b527dd5e6eead54c8bc69c333170e8
                              • Instruction Fuzzy Hash: 77618D7490024AAFDF11EFA5D8889AE7FB8FB45308F140459EC42A7251EB31AD09DB21
                              APIs
                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 005A6FA5
                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 005A6FA8
                              • GetWindowLongW.USER32(?,000000F0), ref: 005A6FCC
                              • _memset.LIBCMT ref: 005A6FDD
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 005A6FEF
                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 005A7067
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$LongWindow_memset
                              • String ID:
                              • API String ID: 830647256-0
                              • Opcode ID: c4a95edf85eeaee134164a7a5acf709b8ec442a3c589902346e53c611bb44b44
                              • Instruction ID: ade153dbce94e7278757e1e9801bb5be1438a169492dfa0bf13ca6c527317b27
                              • Opcode Fuzzy Hash: c4a95edf85eeaee134164a7a5acf709b8ec442a3c589902346e53c611bb44b44
                              • Instruction Fuzzy Hash: DC619A74900248AFDB10DFA4CC85EEE7BF8FB0A314F140169FA04AB2A1D771AD45DB90
                              APIs
                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00576BBF
                              • SafeArrayAllocData.OLEAUT32(?), ref: 00576C18
                              • VariantInit.OLEAUT32(?), ref: 00576C2A
                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00576C4A
                              • VariantCopy.OLEAUT32(?,?), ref: 00576C9D
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00576CB1
                              • VariantClear.OLEAUT32(?), ref: 00576CC6
                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00576CD3
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00576CDC
                              • VariantClear.OLEAUT32(?), ref: 00576CEE
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00576CF9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                              • String ID:
                              • API String ID: 2706829360-0
                              • Opcode ID: 412cb731673d8f5edd95463883c9cb480a46556ec5f66a87e61db0b8af508df4
                              • Instruction ID: e47cf511a4ef8f51886a81615c2d79d07a684a52efc4d8a28ffbe71d2396aabe
                              • Opcode Fuzzy Hash: 412cb731673d8f5edd95463883c9cb480a46556ec5f66a87e61db0b8af508df4
                              • Instruction Fuzzy Hash: 1C414075A0011A9FCF04DFA4D8489AEBFB9FF59350F00C069E959A7261DB30AD45DB90
                              APIs
                                • Part of subcall function 00529837: __itow.LIBCMT ref: 00529862
                                • Part of subcall function 00529837: __swprintf.LIBCMT ref: 005298AC
                              • CoInitialize.OLE32 ref: 00598403
                              • CoUninitialize.COMBASE ref: 0059840E
                              • CoCreateInstance.COMBASE(?,00000000,00000017,005B2BEC,?), ref: 0059846E
                              • IIDFromString.COMBASE(?,?), ref: 005984E1
                              • VariantInit.OLEAUT32(?), ref: 0059857B
                              • VariantClear.OLEAUT32(?), ref: 005985DC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                              • API String ID: 834269672-1287834457
                              • Opcode ID: 2150ba7087a1c5bc35261340a32cf519062fc213555fb0a640fbdadd64c8df7f
                              • Instruction ID: e037d83c74828afa5268aade594be8662c1fe64f9cbe13b6d5c40f4fc7ebdba5
                              • Opcode Fuzzy Hash: 2150ba7087a1c5bc35261340a32cf519062fc213555fb0a640fbdadd64c8df7f
                              • Instruction Fuzzy Hash: 21619270608312AFCB10DF54D848F6ABFE4BF8A754F144819F9859B291DB70ED48CB92
                              APIs
                              • WSAStartup.WS2_32(00000101,?), ref: 00595793
                              • inet_addr.WS2_32(?), ref: 005957D8
                              • gethostbyname.WS2_32(?), ref: 005957E4
                              • IcmpCreateFile.IPHLPAPI ref: 005957F2
                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00595862
                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00595878
                              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 005958ED
                              • WSACleanup.WS2_32 ref: 005958F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                              • String ID: Ping
                              • API String ID: 1028309954-2246546115
                              • Opcode ID: bbe78d998b7df0b700a46c43cd32500f30e2db07091afe1be4944061b6a744d6
                              • Instruction ID: 4885941ead4419fbde8963d49ac22913d1ad014036a7f7917fa0ad227c612c55
                              • Opcode Fuzzy Hash: bbe78d998b7df0b700a46c43cd32500f30e2db07091afe1be4944061b6a744d6
                              • Instruction Fuzzy Hash: 82517E316046019FDB11EF64DC49B2ABBE4FF89720F148929F956DB2E1EB30E914DB41
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0058B4D0
                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 0058B546
                              • GetLastError.KERNEL32 ref: 0058B550
                              • SetErrorMode.KERNEL32(00000000,READY), ref: 0058B5BD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Error$Mode$DiskFreeLastSpace
                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                              • API String ID: 4194297153-14809454
                              • Opcode ID: 00ceb8e3b142c6ea528c0187f3b7581bb7a341bfc2920ea33d69e93d26bd2517
                              • Instruction ID: d51de5f996eacc495f51f3fa7d73919a72c481020a677dc18e492e2616ee5dff
                              • Opcode Fuzzy Hash: 00ceb8e3b142c6ea528c0187f3b7581bb7a341bfc2920ea33d69e93d26bd2517
                              • Instruction Fuzzy Hash: 75318335A0020ADFEB10FB68D889EBE7FB8FF49311F144166E905A7291EB709A45CB51
                              APIs
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                                • Part of subcall function 0057AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0057AABC
                              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00579014
                              • GetDlgCtrlID.USER32 ref: 0057901F
                              • GetParent.USER32 ref: 0057903B
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 0057903E
                              • GetDlgCtrlID.USER32(?), ref: 00579047
                              • GetParent.USER32(?), ref: 00579063
                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00579066
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 1536045017-1403004172
                              • Opcode ID: 62ae2384745b587d31cd1223f088d8cf8175e2acfd73b07d61ef5ef3c8b4ac75
                              • Instruction ID: 3a027925cb637a753de5598bb152ede518aaf12a060dc2f31883d1d8e5dca321
                              • Opcode Fuzzy Hash: 62ae2384745b587d31cd1223f088d8cf8175e2acfd73b07d61ef5ef3c8b4ac75
                              • Instruction Fuzzy Hash: 4E21B574A00109BBDF14ABA4DC89EBEBF74FF9A310F104116B525572E1DB755819EB20
                              APIs
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                                • Part of subcall function 0057AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0057AABC
                              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 005790FD
                              • GetDlgCtrlID.USER32 ref: 00579108
                              • GetParent.USER32 ref: 00579124
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00579127
                              • GetDlgCtrlID.USER32(?), ref: 00579130
                              • GetParent.USER32(?), ref: 0057914C
                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 0057914F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 1536045017-1403004172
                              • Opcode ID: 9011622473615b007e7c7931b7b2a9f9fc73c19b8ad5cd73d41ea5c9ae68e3dc
                              • Instruction ID: 3acb1e3232d296a60038985260ff037c5ad3ec661f8ff1dec4ec830ea6e810f9
                              • Opcode Fuzzy Hash: 9011622473615b007e7c7931b7b2a9f9fc73c19b8ad5cd73d41ea5c9ae68e3dc
                              • Instruction Fuzzy Hash: 79210774A00109BBDF10ABA4EC89EFEBF78FF9A300F004016F915972A1DB754819EB20
                              APIs
                              • GetParent.USER32 ref: 0057916F
                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00579184
                              • _wcscmp.LIBCMT ref: 00579196
                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00579211
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ClassMessageNameParentSend_wcscmp
                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                              • API String ID: 1704125052-3381328864
                              • Opcode ID: c7d2fbe69ff7fabef1991ecb7934a8855070187f40bdfd4be32c8c05756523f2
                              • Instruction ID: cd743b63733ef7f41a0c149bc65998456f5ddc445db21569681bd3b2cf647389
                              • Opcode Fuzzy Hash: c7d2fbe69ff7fabef1991ecb7934a8855070187f40bdfd4be32c8c05756523f2
                              • Instruction Fuzzy Hash: 1511EB3B18C31775EA213628FC1ADE73F9CBB15724B204417F904E51D6FE51586176A4
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 005988D7
                              • CoInitialize.OLE32(00000000), ref: 00598904
                              • CoUninitialize.COMBASE ref: 0059890E
                              • GetRunningObjectTable.OLE32(00000000,?), ref: 00598A0E
                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00598B3B
                              • CoGetInstanceFromFile.COMBASE(00000000,?,00000000,00000015,00000002,?,00000001,005B2C0C), ref: 00598B6F
                              • CoGetObject.OLE32(?,00000000,005B2C0C,?), ref: 00598B92
                              • SetErrorMode.KERNEL32(00000000), ref: 00598BA5
                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00598C25
                              • VariantClear.OLEAUT32(?), ref: 00598C35
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                              • String ID:
                              • API String ID: 2395222682-0
                              • Opcode ID: eeb65dad19e6c0c3c43601cad0eb84dd71d7720dbbc79a2b9af4260b344c2ca9
                              • Instruction ID: 0e7c16ff2418d8e597e9fa68a2df5fb287caa1ace1287c3cd5c0bb6542e7e5e7
                              • Opcode Fuzzy Hash: eeb65dad19e6c0c3c43601cad0eb84dd71d7720dbbc79a2b9af4260b344c2ca9
                              • Instruction Fuzzy Hash: A4C118B1608305AFDB00DF64C88492BBBE9FF8A748F04495DF98A9B251DB71ED05CB52
                              APIs
                              • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00587A6C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ArraySafeVartype
                              • String ID:
                              • API String ID: 1725837607-0
                              • Opcode ID: b9e039ad6f1d6414c64aa805c63f4d1116424c79665330bc4bfdb36452fb3c1b
                              • Instruction ID: 7ced8ac5eb1557489176f1bdcbddd1d09fe1925c2d3b62b360f1bd771b8a51f1
                              • Opcode Fuzzy Hash: b9e039ad6f1d6414c64aa805c63f4d1116424c79665330bc4bfdb36452fb3c1b
                              • Instruction Fuzzy Hash: F3B16A7190421A9FDB00EFA4C889BBEBBB5FF4D321F244429EA41A7291D734E945DB90
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 005811F0
                              • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00580268,?,00000001), ref: 00581204
                              • GetWindowThreadProcessId.USER32(00000000), ref: 0058120B
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00580268,?,00000001), ref: 0058121A
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 0058122C
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00580268,?,00000001), ref: 00581245
                              • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00580268,?,00000001), ref: 00581257
                              • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00580268,?,00000001), ref: 0058129C
                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00580268,?,00000001), ref: 005812B1
                              • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00580268,?,00000001), ref: 005812BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                              • String ID:
                              • API String ID: 2156557900-0
                              • Opcode ID: 31a3e86303e24c8e659eeca0048aeaf25fb0c506914844bf9310cec9fb27b6b5
                              • Instruction ID: dbca7798113b804e9e5fa52b4597d28517b928f0701ee4a3bc4f53d0f0e80ff9
                              • Opcode Fuzzy Hash: 31a3e86303e24c8e659eeca0048aeaf25fb0c506914844bf9310cec9fb27b6b5
                              • Instruction Fuzzy Hash: 4431FF79600604FBEB64AF91ED88F693BADFB75391F104114FC11EB1A0D3B09D499B54
                              APIs
                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0052FAA6
                              • OleUninitialize.OLE32(?,00000000), ref: 0052FB45
                              • UnregisterHotKey.USER32(?), ref: 0052FC9C
                              • DestroyWindow.USER32(?), ref: 005645D6
                              • FreeLibrary.KERNEL32(?), ref: 0056463B
                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00564668
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                              • String ID: close all
                              • API String ID: 469580280-3243417748
                              • Opcode ID: 45289fbf65dba68ce72eac68f710548f059fbb942bee862ab04884a185915796
                              • Instruction ID: 9e019040bc527337f3a7016fa45a9b6441f1974e4610ebfe310aa4da9bba5a09
                              • Opcode Fuzzy Hash: 45289fbf65dba68ce72eac68f710548f059fbb942bee862ab04884a185915796
                              • Instruction Fuzzy Hash: 12A17031701222CFCB19EF14E599A69FB64BF56704F5446BDE80AAB2A1DB30AC16CF50
                              APIs
                              • EnumChildWindows.USER32(?,0057A439), ref: 0057A377
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ChildEnumWindows
                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                              • API String ID: 3555792229-1603158881
                              • Opcode ID: 3be33df259ccccffd7db1c5063c1d8ca6d44623b333a11b30ab9b1898ef50f5c
                              • Instruction ID: 0f7a6d49abbba6d8b1184912e9af88c5ac6d0e847b0198b5b4ed1cbbe0858ecf
                              • Opcode Fuzzy Hash: 3be33df259ccccffd7db1c5063c1d8ca6d44623b333a11b30ab9b1898ef50f5c
                              • Instruction Fuzzy Hash: BC910631600606AADB08DFA0D459BEDFFB4BF84304F54C51AE84DA3292DF306999EBD1
                              APIs
                              • SetWindowLongW.USER32(?,000000EB), ref: 00522EAE
                                • Part of subcall function 00521DB3: GetClientRect.USER32(?,?), ref: 00521DDC
                                • Part of subcall function 00521DB3: GetWindowRect.USER32(?,?), ref: 00521E1D
                                • Part of subcall function 00521DB3: ScreenToClient.USER32(?,?), ref: 00521E45
                              • GetDC.USER32 ref: 0055CD32
                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0055CD45
                              • SelectObject.GDI32(00000000,00000000), ref: 0055CD53
                              • SelectObject.GDI32(00000000,00000000), ref: 0055CD68
                              • ReleaseDC.USER32(?,00000000), ref: 0055CD70
                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 0055CDFB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                              • String ID: U
                              • API String ID: 4009187628-3372436214
                              • Opcode ID: 98c38df127071c36addf99adee27e5b950a686dc3ca6a6b27e9dc028b8d9ab51
                              • Instruction ID: 3551b44a6ad9486b2da0504ac4c9b3aacdf2c2dc1a258fe35d4ec27adaad65f8
                              • Opcode Fuzzy Hash: 98c38df127071c36addf99adee27e5b950a686dc3ca6a6b27e9dc028b8d9ab51
                              • Instruction Fuzzy Hash: 2471F231400345EFCF258F64CC94ABA3FB5FF5A325F14466AED569A2A6D7308C48EB60
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00591A50
                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00591A7C
                              • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00591ABE
                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00591AD3
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00591AE0
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00591B10
                              • InternetCloseHandle.WININET(00000000), ref: 00591B57
                                • Part of subcall function 00592483: GetLastError.KERNEL32(?,?,00591817,00000000,00000000,00000001), ref: 00592498
                                • Part of subcall function 00592483: SetEvent.KERNEL32(?,?,00591817,00000000,00000000,00000001), ref: 005924AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                              • String ID:
                              • API String ID: 2603140658-3916222277
                              • Opcode ID: 8ccd7cd12e7350d965ffd4180516c3cdce3777bceb810a20ae2a8fc2649a8528
                              • Instruction ID: 062412857df2f382f116ff224df5bcd97d8fb68595795156d84e08d3110181e2
                              • Opcode Fuzzy Hash: 8ccd7cd12e7350d965ffd4180516c3cdce3777bceb810a20ae2a8fc2649a8528
                              • Instruction Fuzzy Hash: E8417FB150162ABFEF118F50CC89FFA7BADFF09354F004126F9059A191E7749E449BA4
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,005AF910), ref: 00598D28
                              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,005AF910), ref: 00598D5C
                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00598ED6
                              • SysFreeString.OLEAUT32(?), ref: 00598F00
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Free$FileLibraryModuleNamePathQueryStringType
                              • String ID:
                              • API String ID: 560350794-0
                              • Opcode ID: 23df554d13764ca2ef0aec2dd34bd9a2372499e768e4c07c8cc8014aa6d856f3
                              • Instruction ID: ce02c00d89320ee8489f6e43284d8229299dea20d3e2c985a5def4fd72eebea2
                              • Opcode Fuzzy Hash: 23df554d13764ca2ef0aec2dd34bd9a2372499e768e4c07c8cc8014aa6d856f3
                              • Instruction Fuzzy Hash: 71F11A71A00219EFDF14DF94C888EAEBBB9FF86314F108498F915AB251DB31AE45DB50
                              APIs
                              • _memset.LIBCMT ref: 0059F6B5
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0059F848
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0059F86C
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0059F8AC
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0059F8CE
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0059FA4A
                              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0059FA7C
                              • CloseHandle.KERNEL32(?), ref: 0059FAAB
                              • CloseHandle.KERNEL32(?), ref: 0059FB22
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                              • String ID:
                              • API String ID: 4090791747-0
                              • Opcode ID: 6e7846af0c4e91949112cca2458012625bb37c9765a7a7a76e98f0d64bf7decf
                              • Instruction ID: 9542e5fbdaf84612e8dcbc1e5688413c9282cd0b276090f5ee5940e27b9abc6f
                              • Opcode Fuzzy Hash: 6e7846af0c4e91949112cca2458012625bb37c9765a7a7a76e98f0d64bf7decf
                              • Instruction Fuzzy Hash: 44E19E316042129FCB14EF24D885B6ABFE1FF85314F18896DF8999B2A2CB31DC45CB52
                              APIs
                                • Part of subcall function 00521B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00522036,?,00000000,?,?,?,?,005216CB,00000000,?), ref: 00521B9A
                              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 005220D3
                              • KillTimer.USER32(-00000001,?,?,?,?,005216CB,00000000,?,?,00521AE2,?,?), ref: 0052216E
                              • DestroyAcceleratorTable.USER32(00000000), ref: 0055BCA6
                              • DeleteObject.GDI32(00000000), ref: 0055BD1C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Destroy$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                              • String ID:
                              • API String ID: 2402799130-0
                              • Opcode ID: 9d6f8bded0c3200c91c879279dd5a4515917fcdaa4de993d81336e3851eeb53d
                              • Instruction ID: 318d893875da3f0df2723b401d79b3f95d6d1dc73123d02ae645989f89910a35
                              • Opcode Fuzzy Hash: 9d6f8bded0c3200c91c879279dd5a4515917fcdaa4de993d81336e3851eeb53d
                              • Instruction Fuzzy Hash: 8E61A035504B61EFDB399F14E99CB257FF1FF62316F204529E9824A5B0C770A898EB80
                              APIs
                                • Part of subcall function 0058466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00583697,?), ref: 0058468B
                                • Part of subcall function 0058466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00583697,?), ref: 005846A4
                                • Part of subcall function 00584A31: GetFileAttributesW.KERNEL32(?,0058370B), ref: 00584A32
                              • lstrcmpiW.KERNEL32(?,?), ref: 00584D40
                              • _wcscmp.LIBCMT ref: 00584D5A
                              • MoveFileW.KERNEL32(?,?), ref: 00584D75
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                              • String ID:
                              • API String ID: 793581249-0
                              • Opcode ID: bf3c2ceabb40806b38ad77cd2ccefad8ab545338506432959f5a02ba6b0e84e9
                              • Instruction ID: b97c1fc48d187496671910b72e93e5546cfeee0369282a47dd9782810cecc8c7
                              • Opcode Fuzzy Hash: bf3c2ceabb40806b38ad77cd2ccefad8ab545338506432959f5a02ba6b0e84e9
                              • Instruction Fuzzy Hash: E65165B24083469BC724EB90D8859DFBBECBFC5310F40092EBA85D3151EF34A588CB56
                              APIs
                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 005A86FF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: InvalidateRect
                              • String ID:
                              • API String ID: 634782764-0
                              • Opcode ID: b516beb4a2dc5ea7f20de2b27912935b3aad7a6822389036ee0e826c15d42064
                              • Instruction ID: 2cc7da64c034cecdc738d3c3069cdf8c0d307ebca21abf5edc61b2a32026c376
                              • Opcode Fuzzy Hash: b516beb4a2dc5ea7f20de2b27912935b3aad7a6822389036ee0e826c15d42064
                              • Instruction Fuzzy Hash: 0251AC34600255BEEB249B289C89FBD7FA5FB17320F600521FA51E72A1DF76A980DB50
                              APIs
                              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 0055C2F7
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0055C319
                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 0055C331
                              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 0055C34F
                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 0055C370
                              • DestroyCursor.USER32(00000000), ref: 0055C37F
                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0055C39C
                              • DestroyCursor.USER32(?), ref: 0055C3AB
                                • Part of subcall function 005AA4AF: DeleteObject.GDI32(00000000), ref: 005AA4E8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CursorDestroyExtractIconImageLoadMessageSend$DeleteObject
                              • String ID:
                              • API String ID: 2975913752-0
                              • Opcode ID: fbd16b0435c3476f30ff666de84be3f6a27751c212aa8b3356c8ee886008b3c1
                              • Instruction ID: 939d20c117ea4c8cbd6c7c274a19d4384883b5eaa7d8d0726930227b35277f25
                              • Opcode Fuzzy Hash: fbd16b0435c3476f30ff666de84be3f6a27751c212aa8b3356c8ee886008b3c1
                              • Instruction Fuzzy Hash: 43514874600309AFDB24DF64DC45BAA3FA5FF5A311F104929F942A72E0DB70AD54EB50
                              APIs
                                • Part of subcall function 0057A82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 0057A84C
                                • Part of subcall function 0057A82C: GetCurrentThreadId.KERNEL32 ref: 0057A853
                                • Part of subcall function 0057A82C: AttachThreadInput.USER32(00000000,?,00579683,?,00000001), ref: 0057A85A
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 0057968E
                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 005796AB
                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 005796AE
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 005796B7
                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 005796D5
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 005796D8
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 005796E1
                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 005796F8
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 005796FB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                              • String ID:
                              • API String ID: 2014098862-0
                              • Opcode ID: be8b16fd40e441e308bfce826122a5e21752d18c21ddc3f9d94fa2427109d432
                              • Instruction ID: 8b02e64fff0254b80705908c65e5cb190a699c78650cf95e59abd896cabffe61
                              • Opcode Fuzzy Hash: be8b16fd40e441e308bfce826122a5e21752d18c21ddc3f9d94fa2427109d432
                              • Instruction Fuzzy Hash: 2511E1B1910618BFF6106FA0EC89F6A3F2DEB8D750F100425F248AB0E0C9F25C11EBA4
                              APIs
                              • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,0057853C,00000B00,?,?), ref: 0057892A
                              • RtlAllocateHeap.NTDLL(00000000,?,0057853C), ref: 00578931
                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,0057853C,00000B00,?,?), ref: 00578946
                              • GetCurrentProcess.KERNEL32(?,00000000,?,0057853C,00000B00,?,?), ref: 0057894E
                              • DuplicateHandle.KERNEL32(00000000,?,0057853C,00000B00,?,?), ref: 00578951
                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,0057853C,00000B00,?,?), ref: 00578961
                              • GetCurrentProcess.KERNEL32(0057853C,00000000,?,0057853C,00000B00,?,?), ref: 00578969
                              • DuplicateHandle.KERNEL32(00000000,?,0057853C,00000B00,?,?), ref: 0057896C
                              • CreateThread.KERNEL32(00000000,00000000,00578992,00000000,00000000,00000000), ref: 00578986
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Process$Current$DuplicateHandleHeap$AllocateCreateThread
                              • String ID:
                              • API String ID: 1422014791-0
                              • Opcode ID: 9d437c03dd23d398a80c720d3bdc6ebd3897e3762f6355060fa5fb9a9ea7f330
                              • Instruction ID: 4ba5d475104c3217664638eeef91f38330a15340c2a8a14c8c471226eba8147f
                              • Opcode Fuzzy Hash: 9d437c03dd23d398a80c720d3bdc6ebd3897e3762f6355060fa5fb9a9ea7f330
                              • Instruction Fuzzy Hash: 1101BBB5240308FFE760ABA5DC4DF6B3BACEB99711F418421FA05DB1A1DA709804DB20
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$_memset
                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                              • API String ID: 2862541840-625585964
                              • Opcode ID: e1753d4f7d73b686109a3dd6dbadd1b1d833b458d6ce181c4faeded6a6a5af01
                              • Instruction ID: cb5a37af55537c33d5f06c338b761260f843981d18789d6f3c20cfef68383495
                              • Opcode Fuzzy Hash: e1753d4f7d73b686109a3dd6dbadd1b1d833b458d6ce181c4faeded6a6a5af01
                              • Instruction Fuzzy Hash: 09915E71A00219ABDF24DFA9C848FAEBBB8FF85714F10855EF515AB280D7709945CFA0
                              APIs
                                • Part of subcall function 0057710A: CLSIDFromProgID.COMBASE ref: 00577127
                                • Part of subcall function 0057710A: ProgIDFromCLSID.COMBASE(?,00000000), ref: 00577142
                                • Part of subcall function 0057710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00577044,80070057,?,?), ref: 00577150
                                • Part of subcall function 0057710A: CoTaskMemFree.COMBASE(00000000), ref: 00577160
                              • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 00599806
                              • _memset.LIBCMT ref: 00599813
                              • _memset.LIBCMT ref: 00599956
                              • CoCreateInstanceEx.COMBASE(?,00000000,00000015,?,00000001,00000000), ref: 00599982
                              • CoTaskMemFree.COMBASE(?), ref: 0059998D
                              Strings
                              • NULL Pointer assignment, xrefs: 005999DB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                              • String ID: NULL Pointer assignment
                              • API String ID: 1300414916-2785691316
                              • Opcode ID: 4508ab0f9013fd23ce3a006cf6a0fcf4d89ca669e065034e615a176d62793a3f
                              • Instruction ID: 32e6b94a225e4ba7e6df6b28d6b6b82535685aa1294307cf17133c5f91e6769d
                              • Opcode Fuzzy Hash: 4508ab0f9013fd23ce3a006cf6a0fcf4d89ca669e065034e615a176d62793a3f
                              • Instruction Fuzzy Hash: 02910771D00229ABDF10DFA5DC45ADEBBB9FF49310F10415AF419A7291EB71AA44CFA0
                              APIs
                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 005A6E24
                              • SendMessageW.USER32(?,00001036,00000000,?), ref: 005A6E38
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 005A6E52
                              • _wcscat.LIBCMT ref: 005A6EAD
                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 005A6EC4
                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 005A6EF2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$Window_wcscat
                              • String ID: SysListView32
                              • API String ID: 307300125-78025650
                              • Opcode ID: eba0fc8d864d75ad1416d2a1aa29990b700b72ca4e9e4b9669d6f1956b8ce090
                              • Instruction ID: 281b55ad8e1446f7e08effa93113865dc272fa819878c3d6c42103dbfb059c33
                              • Opcode Fuzzy Hash: eba0fc8d864d75ad1416d2a1aa29990b700b72ca4e9e4b9669d6f1956b8ce090
                              • Instruction Fuzzy Hash: 86419070A00349AFEB219FA4CC89BEE7BE9FF09354F14042AF584E7291D6719D848B60
                              APIs
                                • Part of subcall function 00583C55: CreateToolhelp32Snapshot.KERNEL32 ref: 00583C7A
                                • Part of subcall function 00583C55: Process32FirstW.KERNEL32(00000000,?), ref: 00583C88
                                • Part of subcall function 00583C55: CloseHandle.KERNEL32(00000000), ref: 00583D52
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0059E9A4
                              • GetLastError.KERNEL32 ref: 0059E9B7
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0059E9E6
                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 0059EA63
                              • GetLastError.KERNEL32(00000000), ref: 0059EA6E
                              • CloseHandle.KERNEL32(00000000), ref: 0059EAA3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                              • String ID: SeDebugPrivilege
                              • API String ID: 2533919879-2896544425
                              • Opcode ID: 4cb57555c4195c689df281d56eed79914c764efe230443cd9e55db101242f38a
                              • Instruction ID: 9935b64e324d872a5b8ab29c82a6a7a25e761e5bc09c8994362f03b4fbf32059
                              • Opcode Fuzzy Hash: 4cb57555c4195c689df281d56eed79914c764efe230443cd9e55db101242f38a
                              • Instruction Fuzzy Hash: 8441AC712002029FDB14EF54DC9AF6EBFA5BF81314F088859F9469B3D2CB75A808DB91
                              APIs
                              • LoadIconW.USER32(00000000,00007F03), ref: 00583033
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: IconLoad
                              • String ID: blank$info$question$stop$warning
                              • API String ID: 2457776203-404129466
                              • Opcode ID: 324dd154ed8862620c00250595a3a52bac8c0b1f810c57ebda0c10079d16f54e
                              • Instruction ID: 4a3faa5b7fa3f00004d7ec8996e3f6d8d672c7e772257078154d75818f308303
                              • Opcode Fuzzy Hash: 324dd154ed8862620c00250595a3a52bac8c0b1f810c57ebda0c10079d16f54e
                              • Instruction Fuzzy Hash: 2411D83124C346FAD724AA58DC4ADBB7F9CBF15764F10006BFD00B6281DA619F4057A5
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00584312
                              • LoadStringW.USER32(00000000), ref: 00584319
                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0058432F
                              • LoadStringW.USER32(00000000), ref: 00584336
                              • _wprintf.LIBCMT ref: 0058435C
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0058437A
                              Strings
                              • %s (%d) : ==> %s: %s %s, xrefs: 00584357
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString$Message_wprintf
                              • String ID: %s (%d) : ==> %s: %s %s
                              • API String ID: 3648134473-3128320259
                              • Opcode ID: 8db2c43362ef6148bb3c9af1013dfc5e5553231167e844e844de316dde983dba
                              • Instruction ID: 44a456f75485c641968ea369123befea376f577c80a2163249b0bb941013f3ba
                              • Opcode Fuzzy Hash: 8db2c43362ef6148bb3c9af1013dfc5e5553231167e844e844de316dde983dba
                              • Instruction Fuzzy Hash: DD0162F6940208BFE761A7E4DD89EFB776CEB09300F0005A2BB45E2051EA745E899B74
                              APIs
                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0055C1C7,00000004,00000000,00000000,00000000), ref: 00522ACF
                              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,0055C1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00522B17
                              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,0055C1C7,00000004,00000000,00000000,00000000), ref: 0055C21A
                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,0055C1C7,00000004,00000000,00000000,00000000), ref: 0055C286
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ShowWindow
                              • String ID:
                              • API String ID: 1268545403-0
                              • Opcode ID: 0b8cf3307229fa6582fb27f92d190481539389159023d6b79a06a09733dee29c
                              • Instruction ID: dc3b6ef78c0b4a462afb32bd1a166b4c0d0a4a915ce2b8cb3d2f9007843dede1
                              • Opcode Fuzzy Hash: 0b8cf3307229fa6582fb27f92d190481539389159023d6b79a06a09733dee29c
                              • Instruction Fuzzy Hash: CA412C39208790BEC7358B68AC9C76B7FD2BF97300F14882EE487469E0C7B19889D710
                              APIs
                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 005870DD
                                • Part of subcall function 00540DB6: std::exception::exception.LIBCMT ref: 00540DEC
                                • Part of subcall function 00540DB6: __CxxThrowException@8.LIBCMT ref: 00540E01
                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00587114
                              • RtlEnterCriticalSection.NTDLL(?), ref: 00587130
                              • _memmove.LIBCMT ref: 0058717E
                              • _memmove.LIBCMT ref: 0058719B
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 005871AA
                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 005871BF
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 005871DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                              • String ID:
                              • API String ID: 256516436-0
                              • Opcode ID: 855969acafe6e8c29f886396c6697dc58771638578874c7296446954d06eed63
                              • Instruction ID: bf282c61e98cc1e3ff9192026561cb6192ef8db39bb77dd42e06995972bb276c
                              • Opcode Fuzzy Hash: 855969acafe6e8c29f886396c6697dc58771638578874c7296446954d06eed63
                              • Instruction Fuzzy Hash: DC315E75900205EBDB10EFA5DC89AAABB78FF85710F2441A5ED04AB256DB30DA14DB60
                              APIs
                              • DeleteObject.GDI32(00000000), ref: 005A61EB
                              • GetDC.USER32(00000000), ref: 005A61F3
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 005A61FE
                              • ReleaseDC.USER32(00000000,00000000), ref: 005A620A
                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 005A6246
                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 005A6257
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,005A902A,?,?,000000FF,00000000,?,000000FF,?), ref: 005A6291
                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 005A62B1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                              • String ID:
                              • API String ID: 3864802216-0
                              • Opcode ID: 42f83d97d2ec2940451b3ae391fc0fd5c5d661c434e35313744e92aa9380a59c
                              • Instruction ID: 2844129b324b0a6a8e4a25a21b50ace26249548349df7570d4550855e2ac662f
                              • Opcode Fuzzy Hash: 42f83d97d2ec2940451b3ae391fc0fd5c5d661c434e35313744e92aa9380a59c
                              • Instruction Fuzzy Hash: 1B316D76101210BFEB118F50DC8AFEA3FA9FF5A765F084065FE089A191C6759841DBA4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ca6c9d625b563790ecfc81ab30f2cec3c6d08959c8ee5f94542ab13b1caef81c
                              • Instruction ID: a45ae0961e668249b8231d3aa83580b20664990e2db55d5ae5f5980ee9c369ae
                              • Opcode Fuzzy Hash: ca6c9d625b563790ecfc81ab30f2cec3c6d08959c8ee5f94542ab13b1caef81c
                              • Instruction Fuzzy Hash: F8716830900519EFDB04DF98DC48ABFBF79FF9A310F108159F915AA291C734AA51CBA4
                              APIs
                              • IsWindow.USER32(00FB3838), ref: 005AB3EB
                              • IsWindowEnabled.USER32(00FB3838), ref: 005AB3F7
                              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 005AB4DB
                              • SendMessageW.USER32(00FB3838,000000B0,?,?), ref: 005AB512
                              • IsDlgButtonChecked.USER32(?,?), ref: 005AB54F
                              • GetWindowLongW.USER32(00FB3838,000000EC), ref: 005AB571
                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 005AB589
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                              • String ID:
                              • API String ID: 4072528602-0
                              • Opcode ID: cf020ed7c747eddbce355f8f6ce418e4435f2046bda2c3d266f441e229e57218
                              • Instruction ID: d9763e0640efec28b1c537b68ff870e37b118862df5b4ce8fd80d19d9db20439
                              • Opcode Fuzzy Hash: cf020ed7c747eddbce355f8f6ce418e4435f2046bda2c3d266f441e229e57218
                              • Instruction Fuzzy Hash: A0717934604204AFEF249F65C894FAE7FBAFF4B300F144459E986972A3D732A954DB90
                              APIs
                              • _memset.LIBCMT ref: 0059F448
                              • _memset.LIBCMT ref: 0059F511
                              • ShellExecuteExW.SHELL32(?), ref: 0059F556
                                • Part of subcall function 00529837: __itow.LIBCMT ref: 00529862
                                • Part of subcall function 00529837: __swprintf.LIBCMT ref: 005298AC
                                • Part of subcall function 0053FC86: _wcscpy.LIBCMT ref: 0053FCA9
                              • GetProcessId.KERNEL32(00000000), ref: 0059F5CD
                              • CloseHandle.KERNEL32(00000000), ref: 0059F5FC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                              • String ID: @
                              • API String ID: 3522835683-2766056989
                              • Opcode ID: 1c7ad6a7c65746e56356fe816f15ba419e35f12d69736b79d80d0248a6a16ceb
                              • Instruction ID: ad1608d2cfaa30416c5f6758efd8fbe878a6ec5ab80d758fc9e6d4a1c9d0a99e
                              • Opcode Fuzzy Hash: 1c7ad6a7c65746e56356fe816f15ba419e35f12d69736b79d80d0248a6a16ceb
                              • Instruction Fuzzy Hash: D261BF75A0062A9FCF14DFA4D4859AEBFF5FF89310F148069E859AB391CB30AD41CB94
                              APIs
                              • GetParent.USER32(?), ref: 00580F8C
                              • GetKeyboardState.USER32(?), ref: 00580FA1
                              • SetKeyboardState.USER32(?), ref: 00581002
                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00581030
                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 0058104F
                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00581095
                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 005810B8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: ffd6f4ae69eb0cae7df2fbaf05b7be86345b983e1887ba2c944ef21551da67f0
                              • Instruction ID: 891ca136ef6e55824c18c64cd36200511801ef775047e885dc1bb7bbe00ecd06
                              • Opcode Fuzzy Hash: ffd6f4ae69eb0cae7df2fbaf05b7be86345b983e1887ba2c944ef21551da67f0
                              • Instruction Fuzzy Hash: A8510660504BD57EFB3663348C09BB6BEAD7B06300F088589EAD5A58C3C2D9DCCAD755
                              APIs
                              • GetParent.USER32(00000000), ref: 00580DA5
                              • GetKeyboardState.USER32(?), ref: 00580DBA
                              • SetKeyboardState.USER32(?), ref: 00580E1B
                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00580E47
                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00580E64
                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00580EA8
                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00580EC9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: d6601ebde74a5d15c8516d841fda87264ea47d10738967bfe1fd701135da7f55
                              • Instruction ID: 191116b2a4ea1b017598fc3d8195e5c90d110b7cd57d4cc1358c6b4fa849c42c
                              • Opcode Fuzzy Hash: d6601ebde74a5d15c8516d841fda87264ea47d10738967bfe1fd701135da7f55
                              • Instruction Fuzzy Hash: 255106A06047D53DFB72A3748C45B7B7FAD7B06300F089889E9D5AA4C2C395AC8DE750
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _wcsncpy$LocalTime
                              • String ID:
                              • API String ID: 2945705084-0
                              • Opcode ID: 7c61ea511a2d09377ca4b4fd321db68e77b9410710b83316b7c3181223dadd05
                              • Instruction ID: 811933c126029b82a8c8462174ee44bc11ce9f90bf0763daa77cd043d47cc48c
                              • Opcode Fuzzy Hash: 7c61ea511a2d09377ca4b4fd321db68e77b9410710b83316b7c3181223dadd05
                              • Instruction Fuzzy Hash: B8418075C1061576CB11EBB4884EACFBBA8FF44310F508956F908E3221FA34A755C7A6
                              APIs
                                • Part of subcall function 0058466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00583697,?), ref: 0058468B
                                • Part of subcall function 0058466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00583697,?), ref: 005846A4
                              • lstrcmpiW.KERNEL32(?,?), ref: 005836B7
                              • _wcscmp.LIBCMT ref: 005836D3
                              • MoveFileW.KERNEL32(?,?), ref: 005836EB
                              • _wcscat.LIBCMT ref: 00583733
                              • SHFileOperationW.SHELL32(?), ref: 0058379F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                              • String ID: \*.*
                              • API String ID: 1377345388-1173974218
                              • Opcode ID: c6386539937636620a56a9773b504e93d1a27d4fb3e93b75ec66e8b9fba5bd3b
                              • Instruction ID: e679540389009f1af35b44342729b81768f6601386b441638be14a95ea7fd3ad
                              • Opcode Fuzzy Hash: c6386539937636620a56a9773b504e93d1a27d4fb3e93b75ec66e8b9fba5bd3b
                              • Instruction Fuzzy Hash: FF41AF71508345AAC751EF64C4459DF7BE8FF89780F00082EB88AD3251EA34D689CB52
                              APIs
                              • _memset.LIBCMT ref: 005A72AA
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005A7351
                              • IsMenu.USER32(?), ref: 005A7369
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 005A73B1
                              • DrawMenuBar.USER32 ref: 005A73C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Menu$Item$DrawInfoInsert_memset
                              • String ID: 0
                              • API String ID: 3866635326-4108050209
                              • Opcode ID: 6fc47f53c724cfea69d00c2d85dc3c06d7b4cfc7be1ee0bbe858a4a5dc856ab7
                              • Instruction ID: 5f9a886df0b741fd1728236269af258ea5c45d98fa18760271332a3e2c18f29e
                              • Opcode Fuzzy Hash: 6fc47f53c724cfea69d00c2d85dc3c06d7b4cfc7be1ee0bbe858a4a5dc856ab7
                              • Instruction Fuzzy Hash: C4411675A04209AFDF20DF50D884A9EBBB9FF0A314F25982AFD459B250D730AD54EB60
                              APIs
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 005A0FD4
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 005A0FFE
                              • FreeLibrary.KERNEL32(00000000), ref: 005A10B5
                                • Part of subcall function 005A0FA5: RegCloseKey.ADVAPI32(?), ref: 005A101B
                                • Part of subcall function 005A0FA5: FreeLibrary.KERNEL32(?), ref: 005A106D
                                • Part of subcall function 005A0FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 005A1090
                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 005A1058
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: EnumFreeLibrary$CloseDeleteOpen
                              • String ID:
                              • API String ID: 395352322-0
                              • Opcode ID: 6cea04f0399247806578258078bbc53f913f854be817e4509a7fac9ad02894d5
                              • Instruction ID: d78140b6682e1f1e5d95c36c189101884752e652ad2477928a02604c46a4a726
                              • Opcode Fuzzy Hash: 6cea04f0399247806578258078bbc53f913f854be817e4509a7fac9ad02894d5
                              • Instruction Fuzzy Hash: DA310D71901109BFDB159F90DC89EFFBBBCFF19310F000169E512E2151EA749E899BA4
                              APIs
                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 005A62EC
                              • GetWindowLongW.USER32(00FB3838,000000F0), ref: 005A631F
                              • GetWindowLongW.USER32(00FB3838,000000F0), ref: 005A6354
                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 005A6386
                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 005A63B0
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 005A63C1
                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 005A63DB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: LongWindow$MessageSend
                              • String ID:
                              • API String ID: 2178440468-0
                              • Opcode ID: 34cf7d0315cbe63b16e906b9b1208dc2bb529920309fe6334f82ecb7c615495c
                              • Instruction ID: 7d40b703c191fb462067d9db6e963e231efaa2b24e8abcbd937a5c6adddb13b9
                              • Opcode Fuzzy Hash: 34cf7d0315cbe63b16e906b9b1208dc2bb529920309fe6334f82ecb7c615495c
                              • Instruction Fuzzy Hash: 34313134644280EFDF20CF58DC84F593BE1FB5A714F2915A9F6518F2B2CB71A845AB50
                              APIs
                                • Part of subcall function 00597D8B: inet_addr.WS2_32(00000000), ref: 00597DB6
                              • socket.WS2_32(00000002,00000001,00000006), ref: 005961C6
                              • WSAGetLastError.WS2_32(00000000), ref: 005961D5
                              • ioctlsocket.WS2_32(00000000,8004667E,00000000), ref: 0059620E
                              • connect.WSOCK32(00000000,?,00000010), ref: 00596217
                              • WSAGetLastError.WS2_32 ref: 00596221
                              • closesocket.WS2_32(00000000), ref: 0059624A
                              • ioctlsocket.WS2_32(00000000,8004667E,00000000), ref: 00596263
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                              • String ID:
                              • API String ID: 910771015-0
                              • Opcode ID: 61a8c7853e56d01fead0f0ded5d498a3843c424ab8cb890e43b5b28b744a31e7
                              • Instruction ID: 752db698560d5f1b5fa8eebca097526003167b13bd23ebfbf03619554aa1d356
                              • Opcode Fuzzy Hash: 61a8c7853e56d01fead0f0ded5d498a3843c424ab8cb890e43b5b28b744a31e7
                              • Instruction Fuzzy Hash: CC31A135600219AFDF10AF64DC89BBE7BADFF45750F044029F905A7291DB74AC08DBA1
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                              • API String ID: 1038674560-2734436370
                              • Opcode ID: 72d93e92dc5bb017e750b5202cd225cab6dca82289b8ad00ed45e9fc2382a237
                              • Instruction ID: e7b94e9a097245b55c2f0e1ad9105551f688b029cc8bba26ccb446273946afc9
                              • Opcode Fuzzy Hash: 72d93e92dc5bb017e750b5202cd225cab6dca82289b8ad00ed45e9fc2382a237
                              • Instruction Fuzzy Hash: 2321497220451266D324EA34BC06EEB7FE8FF95344F10C439F98A870A1EB50AD41E3A5
                              APIs
                                • Part of subcall function 00521D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00521D73
                                • Part of subcall function 00521D35: GetStockObject.GDI32(00000011), ref: 00521D87
                                • Part of subcall function 00521D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00521D91
                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 005A7632
                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 005A763F
                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 005A764A
                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 005A7659
                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 005A7665
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$CreateObjectStockWindow
                              • String ID: Msctls_Progress32
                              • API String ID: 1025951953-3636473452
                              • Opcode ID: af91dbbd709ebb0abeedb03967637451b336b68557a32a152b40c43fe00a9b3d
                              • Instruction ID: db57e28a0765a289a5f84f99f7e2d339c55748385e9cbb36a4c5e8879db74405
                              • Opcode Fuzzy Hash: af91dbbd709ebb0abeedb03967637451b336b68557a32a152b40c43fe00a9b3d
                              • Instruction Fuzzy Hash: C2118EB2110219BFEF158F64CC85EEB7F6DFF09798F014115BA04A60A0CA729C21DBA4
                              APIs
                              • _memset.LIBCMT ref: 005AB644
                              • _memset.LIBCMT ref: 005AB653
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,005E6F20,005E6F64), ref: 005AB682
                              • CloseHandle.KERNEL32 ref: 005AB694
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memset$CloseCreateHandleProcess
                              • String ID: o^$do^
                              • API String ID: 3277943733-577272521
                              • Opcode ID: 2017ca09c5beadde507651b1c41c226c28876a41c4d8fe17d6e1e2d06cfe72e7
                              • Instruction ID: 116c0d75b0123e7a26604206865d4c3dfebb436552ee0dc45676790aa0dd1788
                              • Opcode Fuzzy Hash: 2017ca09c5beadde507651b1c41c226c28876a41c4d8fe17d6e1e2d06cfe72e7
                              • Instruction Fuzzy Hash: 35F05EB25403507AE7102761BC4AFBB3E9CFB293D5F004421FA98EA196D7714C04D7A8
                              APIs
                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00543F85), ref: 00544085
                              • GetProcAddress.KERNEL32(00000000), ref: 0054408C
                              • RtlEncodePointer.NTDLL(00000000), ref: 00544097
                              • RtlDecodePointer.NTDLL(00543F85), ref: 005440B2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                              • String ID: RoUninitialize$combase.dll
                              • API String ID: 3489934621-2819208100
                              • Opcode ID: 406e3777f933dcca45a96899b0fee436ea34f8260dc72ef075d4a0325e3f338a
                              • Instruction ID: 0882b12b6986f2eae08d32f77ad7cd02368d24a691c0bc94e2af6edf3c508d83
                              • Opcode Fuzzy Hash: 406e3777f933dcca45a96899b0fee436ea34f8260dc72ef075d4a0325e3f338a
                              • Instruction Fuzzy Hash: 23E09A70585340AFDB18AFA2EC4DB453AA4B725746F104429F141EA0A0CB76560CEB14
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 88696ddafec688a1e1641fd57370b7b29d6183a8c00e8e61bfb0e78b5d57ea2d
                              • Instruction ID: 8b15a171944f9a1af07d2c9b2f44cdc01f7143993fde0862da7914d4a981674a
                              • Opcode Fuzzy Hash: 88696ddafec688a1e1641fd57370b7b29d6183a8c00e8e61bfb0e78b5d57ea2d
                              • Instruction Fuzzy Hash: 7961DE72208312ABCB14EB24DC89E6FBBA8FFD5714F504919F5559B2D2DB309D08CB92
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memmove$__itow__swprintf
                              • String ID:
                              • API String ID: 3253778849-0
                              • Opcode ID: 78a494ea9efca2352b27e18679cc3fe3873682991bb1b200d7a5fc0ed4c63071
                              • Instruction ID: 1871ae485d99d8fde7c55d291be1f47c482088b7955ca80e8ce5e6422f5da36a
                              • Opcode Fuzzy Hash: 78a494ea9efca2352b27e18679cc3fe3873682991bb1b200d7a5fc0ed4c63071
                              • Instruction Fuzzy Hash: 6B616A3090025B9BCB05FF60D889AFE3FA9BF85308F444919FD556A2D2EB34A915DB50
                              APIs
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                                • Part of subcall function 005A0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0059FDAD,?,?), ref: 005A0E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 005A02BD
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 005A02FD
                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 005A0320
                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 005A0349
                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 005A038C
                              • RegCloseKey.ADVAPI32(00000000), ref: 005A0399
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                              • String ID:
                              • API String ID: 4046560759-0
                              • Opcode ID: 87af6206cc200a34808b01789d3b4f94e2d83320a603654fcaf384791ce9fdd3
                              • Instruction ID: 8ea832d1df7d8ac83efe905eaaaafd441feb57a4e888609824af87c0be01afa9
                              • Opcode Fuzzy Hash: 87af6206cc200a34808b01789d3b4f94e2d83320a603654fcaf384791ce9fdd3
                              • Instruction Fuzzy Hash: CE514831118205AFCB14EF64D889E6EBFE8FF8A314F04491DF585872A2DB31E905DB52
                              APIs
                              • GetMenu.USER32(?), ref: 005A57FB
                              • GetMenuItemCount.USER32(00000000), ref: 005A5832
                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 005A585A
                              • GetMenuItemID.USER32(?,?), ref: 005A58C9
                              • GetSubMenu.USER32(?,?), ref: 005A58D7
                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 005A5928
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Menu$Item$CountMessagePostString
                              • String ID:
                              • API String ID: 650687236-0
                              • Opcode ID: 70c0239d138745e15687c28a2b03680e0d739312e81dddbadd66d8225176dea5
                              • Instruction ID: e5aff522789921c683ce6901212513d884b3449501be831d9eb67b18b2b6b521
                              • Opcode Fuzzy Hash: 70c0239d138745e15687c28a2b03680e0d739312e81dddbadd66d8225176dea5
                              • Instruction Fuzzy Hash: BA516D35E00616AFCF05EFA4C8459AEBBB4FF4A310F144469E901BB351DB34AE41DB90
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 0057EF06
                              • VariantClear.OLEAUT32(00000013), ref: 0057EF78
                              • VariantClear.OLEAUT32(00000000), ref: 0057EFD3
                              • _memmove.LIBCMT ref: 0057EFFD
                              • VariantClear.OLEAUT32(?), ref: 0057F04A
                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 0057F078
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Variant$Clear$ChangeInitType_memmove
                              • String ID:
                              • API String ID: 1101466143-0
                              • Opcode ID: 316fccc70e72e85210a8f400bc6f92f7e42a8d4455091391f50480266ffb4823
                              • Instruction ID: d616a97b79908e61d10ecfbc5675feae52a2a075f51b652923e63c641a1c41e9
                              • Opcode Fuzzy Hash: 316fccc70e72e85210a8f400bc6f92f7e42a8d4455091391f50480266ffb4823
                              • Instruction Fuzzy Hash: 1F515AB5A00209EFDB14CF58D884AAABBB8FF4D314B158569ED59DB301E335E911CFA0
                              APIs
                              • _memset.LIBCMT ref: 00582258
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005822A3
                              • IsMenu.USER32(00000000), ref: 005822C3
                              • CreatePopupMenu.USER32 ref: 005822F7
                              • GetMenuItemCount.USER32(000000FF), ref: 00582355
                              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00582386
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                              • String ID:
                              • API String ID: 3311875123-0
                              • Opcode ID: 7e6230005208fe40a4a911e2c159477604c83be20a5a5d27dafefd0f8d8ab94c
                              • Instruction ID: b4143b24bb80387bfeb8ab5afae1788f3c6bfca9738c9a1aa5a0714ea4483740
                              • Opcode Fuzzy Hash: 7e6230005208fe40a4a911e2c159477604c83be20a5a5d27dafefd0f8d8ab94c
                              • Instruction Fuzzy Hash: BF519C70A0020AEFDF21EF68D898BADBFF5BF56314F104929EC51A7290DB749A44CB51
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                              • BeginPaint.USER32(?,?,?,?,?,?), ref: 0052179A
                              • GetWindowRect.USER32(?,?), ref: 005217FE
                              • ScreenToClient.USER32(?,?), ref: 0052181B
                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0052182C
                              • EndPaint.USER32(?,?), ref: 00521876
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: PaintWindow$BeginClientLongRectScreenViewport
                              • String ID:
                              • API String ID: 1827037458-0
                              • Opcode ID: 7a5515411c38a0c98fdaa7ff6a2cb351c7b948a43f050fa9023e2a3b70b40601
                              • Instruction ID: 3d9c9ef4f0ae5729d51abf8c69127a0460ef7f6ab09d5b41cdb83653d983f253
                              • Opcode Fuzzy Hash: 7a5515411c38a0c98fdaa7ff6a2cb351c7b948a43f050fa9023e2a3b70b40601
                              • Instruction Fuzzy Hash: 53419B31504A51AFD710DF24D8C8BAB7FE8FF66324F140629F9A48B2E1D7309849EB61
                              APIs
                              • ShowWindow.USER32(005E57B0,00000000,00FB3838,?,?,005E57B0,?,005AB5A8,?,?), ref: 005AB712
                              • EnableWindow.USER32(00000000,00000000), ref: 005AB736
                              • ShowWindow.USER32(005E57B0,00000000,00FB3838,?,?,005E57B0,?,005AB5A8,?,?), ref: 005AB796
                              • ShowWindow.USER32(00000000,00000004,?,005AB5A8,?,?), ref: 005AB7A8
                              • EnableWindow.USER32(00000000,00000001), ref: 005AB7CC
                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 005AB7EF
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$Show$Enable$MessageSend
                              • String ID:
                              • API String ID: 642888154-0
                              • Opcode ID: cacbbcd00456e994b67f99526c8a1bd6c63b5de069f89f00c9e5f2fc941c3680
                              • Instruction ID: 83588cd6a742e04de7839d9806acfd0b94a6e5e4e2e377e93b652dc29dec3457
                              • Opcode Fuzzy Hash: cacbbcd00456e994b67f99526c8a1bd6c63b5de069f89f00c9e5f2fc941c3680
                              • Instruction Fuzzy Hash: B9416134600240AFEB26CF24C499B987FE1FF46310F1841B9E9498F6A3C771AC56DBA1
                              APIs
                              • GetForegroundWindow.USER32(?,?,?,?,?,?,00594E41,?,?,00000000,00000001), ref: 005970AC
                                • Part of subcall function 005939A0: GetWindowRect.USER32(?,?), ref: 005939B3
                              • GetDesktopWindow.USER32 ref: 005970D6
                              • GetWindowRect.USER32(00000000), ref: 005970DD
                              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0059710F
                                • Part of subcall function 00585244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 005852BC
                              • GetCursorPos.USER32(?), ref: 0059713B
                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00597199
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                              • String ID:
                              • API String ID: 4137160315-0
                              • Opcode ID: 13bf41c2ec2e04cc7f05db581e098cabf8b001708e16d0641b0701eb112829cf
                              • Instruction ID: 0a094bc3f5ca6efc8499bc1a837760346ea5350d3e974485f56f91a2e2dd9f63
                              • Opcode Fuzzy Hash: 13bf41c2ec2e04cc7f05db581e098cabf8b001708e16d0641b0701eb112829cf
                              • Instruction Fuzzy Hash: 7831C67250530AABD724DF54C849F5BBBE9FFC9314F00091AF58597191DB70EA09CB92
                              APIs
                                • Part of subcall function 00529837: __itow.LIBCMT ref: 00529862
                                • Part of subcall function 00529837: __swprintf.LIBCMT ref: 005298AC
                                • Part of subcall function 0053FC86: _wcscpy.LIBCMT ref: 0053FCA9
                              • _wcstok.LIBCMT ref: 0058EC94
                              • _wcscpy.LIBCMT ref: 0058ED23
                              • _memset.LIBCMT ref: 0058ED56
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                              • String ID: X
                              • API String ID: 774024439-3081909835
                              • Opcode ID: 45ce2edb718d9db6820914fbe7b289e38dd94edc6e78ad69eb1444fa1a3a4bdb
                              • Instruction ID: 4d30f63b9fff0945597522d68fb454fe37d5b8622059d6e2d6809f8586eb331c
                              • Opcode Fuzzy Hash: 45ce2edb718d9db6820914fbe7b289e38dd94edc6e78ad69eb1444fa1a3a4bdb
                              • Instruction Fuzzy Hash: 39C170315087129FC714EF24D88AA5ABBF4FF86314F00492DF9999B2A2DB30EC45CB42
                              APIs
                                • Part of subcall function 005780A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 005780C0
                                • Part of subcall function 005780A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 005780CA
                                • Part of subcall function 005780A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 005780D9
                                • Part of subcall function 005780A9: RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 005780E0
                                • Part of subcall function 005780A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 005780F6
                              • GetLengthSid.ADVAPI32(?,00000000,0057842F), ref: 005788CA
                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 005788D6
                              • RtlAllocateHeap.NTDLL(00000000), ref: 005788DD
                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 005788F6
                              • GetProcessHeap.KERNEL32(00000000,00000000,0057842F), ref: 0057890A
                              • HeapFree.KERNEL32(00000000), ref: 00578911
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocateInformationToken$CopyErrorFreeLastLength
                              • String ID:
                              • API String ID: 169236558-0
                              • Opcode ID: 3b963c09b80456a1a8a5121cc5d1713ab1f0414545e86a47e5211ae92ff19f6e
                              • Instruction ID: ae486315d66dae37bc031e448227e534e58340676e7f0226ed292731a58b1385
                              • Opcode Fuzzy Hash: 3b963c09b80456a1a8a5121cc5d1713ab1f0414545e86a47e5211ae92ff19f6e
                              • Instruction Fuzzy Hash: 6D11B131641209FFDB109FA4EC0DBBE7B68FB45311F148468F98997110CB329D04EB61
                              APIs
                              • GetDC.USER32(00000000), ref: 0057B7B5
                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 0057B7C6
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0057B7CD
                              • ReleaseDC.USER32(00000000,00000000), ref: 0057B7D5
                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0057B7EC
                              • MulDiv.KERNEL32(000009EC,?,?), ref: 0057B7FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CapsDevice$Release
                              • String ID:
                              • API String ID: 1035833867-0
                              • Opcode ID: 108049dba70925fb46a39002e447e2f39f1008a2b8e1153f89446081daefff9a
                              • Instruction ID: f758b8ba659ca94c460becb7554027bc5f14f84531ced7d5ff586d7e15d127a0
                              • Opcode Fuzzy Hash: 108049dba70925fb46a39002e447e2f39f1008a2b8e1153f89446081daefff9a
                              • Instruction Fuzzy Hash: E4018875E00209BBEB105BE69C49B5EBFB8EB59311F004075FA08A7291D6709C00DF90
                              APIs
                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00540193
                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 0054019B
                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 005401A6
                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 005401B1
                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 005401B9
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 005401C1
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Virtual
                              • String ID:
                              • API String ID: 4278518827-0
                              • Opcode ID: 7158b081ab0677ab9cf60ba5b47d9abad0de71798899242d561a586914cb12de
                              • Instruction ID: b730a25c0715643f9812a23932818ffa81e5bd1225f41c00f818249340e8b913
                              • Opcode Fuzzy Hash: 7158b081ab0677ab9cf60ba5b47d9abad0de71798899242d561a586914cb12de
                              • Instruction Fuzzy Hash: A3016CB09017597DE3008F5A8C85B52FFA8FF19354F00411BA15C47941C7F5A868CBE5
                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 005853F9
                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0058540F
                              • GetWindowThreadProcessId.USER32(?,?), ref: 0058541E
                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0058542D
                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00585437
                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0058543E
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                              • String ID:
                              • API String ID: 839392675-0
                              • Opcode ID: 3bf68feaacbb7fb7723772c79492046fd3fc04f46a39d4396267a673ef1a4f9d
                              • Instruction ID: 3f218cda61229ca966428bc3464e41d4b2074deaf056937720d251b592acaed8
                              • Opcode Fuzzy Hash: 3bf68feaacbb7fb7723772c79492046fd3fc04f46a39d4396267a673ef1a4f9d
                              • Instruction Fuzzy Hash: 54F01D32241558BBE7215BE2DC0DEAB7A7CEBD7B11F000169FA04D2061A7A11A05D7B5
                              APIs
                              • InterlockedExchange.KERNEL32(?,?), ref: 00587243
                              • RtlEnterCriticalSection.NTDLL(?), ref: 00587254
                              • TerminateThread.KERNEL32(00000000,000001F6,?,00530EE4,?,?), ref: 00587261
                              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00530EE4,?,?), ref: 0058726E
                                • Part of subcall function 00586C35: CloseHandle.KERNEL32(00000000,?,0058727B,?,00530EE4,?,?), ref: 00586C3F
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00587281
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 00587288
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                              • String ID:
                              • API String ID: 3495660284-0
                              • Opcode ID: 62b27501026a1c725da2588411c920450be6efc4881691075292130504e7d1d0
                              • Instruction ID: b9759b8cf95a12722781d66e73ea5b0c128f1e295e6c8850ac6fca9d76730547
                              • Opcode Fuzzy Hash: 62b27501026a1c725da2588411c920450be6efc4881691075292130504e7d1d0
                              • Instruction Fuzzy Hash: 74F0823E540612EBD7622BA4ED4DAEB7B39FF5A702B100531F503A10B0DB765805DB50
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 00598613
                              • CharUpperBuffW.USER32(?,?), ref: 00598722
                              • VariantClear.OLEAUT32(?), ref: 0059889A
                                • Part of subcall function 00587562: VariantInit.OLEAUT32(00000000), ref: 005875A2
                                • Part of subcall function 00587562: VariantCopy.OLEAUT32(00000000,?), ref: 005875AB
                                • Part of subcall function 00587562: VariantClear.OLEAUT32(00000000), ref: 005875B7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$BuffCharCopyUpper
                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                              • API String ID: 4237274167-1221869570
                              • Opcode ID: e355d74bdcfff7f9fe635d947dda7ad326e3cf49b210806a7621bd62997f974b
                              • Instruction ID: a150628557f7c8ddb2896687eec7b22755f0f38aa174b82c302c1efebfa9d43c
                              • Opcode Fuzzy Hash: e355d74bdcfff7f9fe635d947dda7ad326e3cf49b210806a7621bd62997f974b
                              • Instruction Fuzzy Hash: 6F914C716043029FCB10DF64C48496ABBE4FFDA714F14896EF89A8B3A1DB31E945CB51
                              APIs
                                • Part of subcall function 0053FC86: _wcscpy.LIBCMT ref: 0053FCA9
                              • _memset.LIBCMT ref: 00582B87
                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00582BB6
                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00582C69
                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00582C97
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$Default_memset_wcscpy
                              • String ID: 0
                              • API String ID: 4152858687-4108050209
                              • Opcode ID: 0a3f8c3b89f879270ca0965372e3c0903bd713668e42cb1a08392e573062b28f
                              • Instruction ID: 3f71497e908773df9da97b3ca01440208be59c08fe3efcd7aa51deac7090d51e
                              • Opcode Fuzzy Hash: 0a3f8c3b89f879270ca0965372e3c0903bd713668e42cb1a08392e573062b28f
                              • Instruction Fuzzy Hash: B551CD71619301AAD729AE28D849A7FBFE8FF99314F140A2DFC95E61D0DB70CC049B52
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memmove$_free
                              • String ID: 3cS$_S
                              • API String ID: 2620147621-3431193023
                              • Opcode ID: 571d185ea6e58106ec958c8c9f46dcf117eedd510330abd0fdc14bcc11dab2ef
                              • Instruction ID: 19ca25e07225573d479a8642d853883dbc22961bef0310e1b8333cc2f69f3896
                              • Opcode Fuzzy Hash: 571d185ea6e58106ec958c8c9f46dcf117eedd510330abd0fdc14bcc11dab2ef
                              • Instruction Fuzzy Hash: E2513971A043418FDB25CF28C885B6BBBE5BFC5314F44492DE98987351EB35E945CB42
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memset$_memmove
                              • String ID: 3cS$ERCP
                              • API String ID: 2532777613-430453233
                              • Opcode ID: 7a3b65a624f393bb0e45cf95b8c09db5964d14baf0f79b9cbb6bb5b392b8ce85
                              • Instruction ID: 7232f70c6e483a2ae9cd152235d581105e47d3d25ae3d90872f2652a5b22b460
                              • Opcode Fuzzy Hash: 7a3b65a624f393bb0e45cf95b8c09db5964d14baf0f79b9cbb6bb5b392b8ce85
                              • Instruction Fuzzy Hash: 6F517F71900706EBDB24DF55C9457ABBFE4BF44314F20896EE54ACB291E770AA44CB50
                              APIs
                              • CoCreateInstance.COMBASE(?,00000000,00000005,?,?), ref: 0057D5D4
                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0057D60A
                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0057D61B
                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 0057D69D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ErrorMode$AddressCreateInstanceProc
                              • String ID: DllGetClassObject
                              • API String ID: 753597075-1075368562
                              • Opcode ID: 87ecad87f3292ff766b2db1ee6a39e41ba8d639682e4b6a5470260aac1a58248
                              • Instruction ID: b6ca10c4e53d63dc23d24813f71cb6ed7d7170326a4b4552c5e7b750aa6deea7
                              • Opcode Fuzzy Hash: 87ecad87f3292ff766b2db1ee6a39e41ba8d639682e4b6a5470260aac1a58248
                              • Instruction Fuzzy Hash: B1417CB1600205EFDB15DF64E888A9ABFB9FF84310F1581A9AD0D9F205D7B1D944EBB0
                              APIs
                              • _memset.LIBCMT ref: 005827C0
                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 005827DC
                              • DeleteMenu.USER32(?,00000007,00000000), ref: 00582822
                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,005E5890,00000000), ref: 0058286B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Menu$Delete$InfoItem_memset
                              • String ID: 0
                              • API String ID: 1173514356-4108050209
                              • Opcode ID: 93346bf4ad8f82c2e43dc1394674d7088aa30513d11f7187dd1d51d2c0afeb1f
                              • Instruction ID: 0c3819e91ba7e4e7fada3bac03b5b044a1b8525ded5a63348f929590c402183b
                              • Opcode Fuzzy Hash: 93346bf4ad8f82c2e43dc1394674d7088aa30513d11f7187dd1d51d2c0afeb1f
                              • Instruction Fuzzy Hash: 61418070604342AFDB24EF24C848B5ABFE4FF85314F14492EF965A7291D730A905CB52
                              APIs
                              • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0059D7C5
                                • Part of subcall function 0052784B: _memmove.LIBCMT ref: 00527899
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: BuffCharLower_memmove
                              • String ID: cdecl$none$stdcall$winapi
                              • API String ID: 3425801089-567219261
                              • Opcode ID: 4af12668c7e27346164a33c04993b581fc74cc2ec2e76af0039f3917dfe865a1
                              • Instruction ID: 82659a62d7fa80dd25c924582142cdc550e8e5d005a9476cde8981232fd66e31
                              • Opcode Fuzzy Hash: 4af12668c7e27346164a33c04993b581fc74cc2ec2e76af0039f3917dfe865a1
                              • Instruction Fuzzy Hash: 9131C47190421AABCF10EF58CC559FEBBB4FF45320B108A2AE825977D2DB31AD05CB90
                              APIs
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                                • Part of subcall function 0057AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0057AABC
                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00578F14
                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00578F27
                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00578F57
                                • Part of subcall function 00527BCC: _memmove.LIBCMT ref: 00527C06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$_memmove$ClassName
                              • String ID: ComboBox$ListBox
                              • API String ID: 365058703-1403004172
                              • Opcode ID: b552c9bc318b2fe21b772be6e4a2580f08455e953401d1a6313584d94c8821f5
                              • Instruction ID: cad5eaf85346e71b668ba08b2f628c30e77c2704517dd82a9d952bf497b469eb
                              • Opcode Fuzzy Hash: b552c9bc318b2fe21b772be6e4a2580f08455e953401d1a6313584d94c8821f5
                              • Instruction Fuzzy Hash: 9421F271A40109BEDB14ABB0AC4DCFFBF69FF86320B14851AF429972E1DB354849E650
                              APIs
                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0059184C
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00591872
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 005918A2
                              • InternetCloseHandle.WININET(00000000), ref: 005918E9
                                • Part of subcall function 00592483: GetLastError.KERNEL32(?,?,00591817,00000000,00000000,00000001), ref: 00592498
                                • Part of subcall function 00592483: SetEvent.KERNEL32(?,?,00591817,00000000,00000000,00000001), ref: 005924AD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                              • String ID:
                              • API String ID: 3113390036-3916222277
                              • Opcode ID: 9d75e277ca264c2cddf68a64beadfbb427c7267e4b3f43099c5afa5bdde198ad
                              • Instruction ID: 8ef461809b80449c78e2f7ebbc0c59580e336b13a5936cab45e63fd44d72ca64
                              • Opcode Fuzzy Hash: 9d75e277ca264c2cddf68a64beadfbb427c7267e4b3f43099c5afa5bdde198ad
                              • Instruction Fuzzy Hash: 5321C2B5500719BFEF119F60DC85EBF7BEDFB89784F10412AF40596140EB209D0467A4
                              APIs
                                • Part of subcall function 00521D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00521D73
                                • Part of subcall function 00521D35: GetStockObject.GDI32(00000011), ref: 00521D87
                                • Part of subcall function 00521D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00521D91
                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 005A6461
                              • LoadLibraryW.KERNEL32(?), ref: 005A6468
                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 005A647D
                              • DestroyWindow.USER32(?), ref: 005A6485
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                              • String ID: SysAnimate32
                              • API String ID: 4146253029-1011021900
                              • Opcode ID: f8339160e04ba8b4cc2f614d639ffec48854f54aa1c18fd65824a5258f20a72a
                              • Instruction ID: f33c944d215d1d56dbfb2a7b62aea41bb782ac4921e540a1fa75969f4d59cf65
                              • Opcode Fuzzy Hash: f8339160e04ba8b4cc2f614d639ffec48854f54aa1c18fd65824a5258f20a72a
                              • Instruction Fuzzy Hash: 1F215E71100205ABEF104FA4DC84EBF7FA9FB5A764F18462AFA5097190D7719C51A760
                              APIs
                              • GetStdHandle.KERNEL32(0000000C), ref: 00586DBC
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00586DEF
                              • GetStdHandle.KERNEL32(0000000C), ref: 00586E01
                              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00586E3B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CreateHandle$FilePipe
                              • String ID: nul
                              • API String ID: 4209266947-2873401336
                              • Opcode ID: b5b981b58bc970218d982f5df9f5d023c3e4dc19d004e42ee216676b4d8db7c1
                              • Instruction ID: 50d996e6fdb51c0b5033851542fbe0e647362e0d17d7bf15c6ec42a28e6cb836
                              • Opcode Fuzzy Hash: b5b981b58bc970218d982f5df9f5d023c3e4dc19d004e42ee216676b4d8db7c1
                              • Instruction Fuzzy Hash: 9821A47460020AABDB20AF69DC04B9A7FF8FF95720F204A19FCA1E72D0D7709955DB50
                              APIs
                              • GetStdHandle.KERNEL32(000000F6), ref: 00586E89
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00586EBB
                              • GetStdHandle.KERNEL32(000000F6), ref: 00586ECC
                              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00586F06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CreateHandle$FilePipe
                              • String ID: nul
                              • API String ID: 4209266947-2873401336
                              • Opcode ID: 8d331d08191904f844381bc9832d4af5b4578d23edbd9cb158e5d3296d051695
                              • Instruction ID: 7c2cf2f7976276110327d9535b4e6648f469e855460dada2beee5cff854de95e
                              • Opcode Fuzzy Hash: 8d331d08191904f844381bc9832d4af5b4578d23edbd9cb158e5d3296d051695
                              • Instruction Fuzzy Hash: 8D2174796003059BDB20AF69DC04A9B7BA8FF55720F200A19FDE1E72D0DB70D855CB60
                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 0058AC54
                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 0058ACA8
                              • __swprintf.LIBCMT ref: 0058ACC1
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000,005AF910), ref: 0058ACFF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume__swprintf
                              • String ID: %lu
                              • API String ID: 3164766367-685833217
                              • Opcode ID: 3b1ea8e23c99370370e465c2a2dafc960fa4064d784b091c70387441003acabb
                              • Instruction ID: 941cfb152edf463b3e63cf3205508792d7c6295adbfc851a5174a7baa7805b21
                              • Opcode Fuzzy Hash: 3b1ea8e23c99370370e465c2a2dafc960fa4064d784b091c70387441003acabb
                              • Instruction Fuzzy Hash: 6C21743060020AAFDB10EF55D945DAE7FB8FF8A714B004069F909AB351DB71EA45DB61
                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0057FCED,?,00580D40,?,00008000), ref: 0058115F
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,0057FCED,?,00580D40,?,00008000), ref: 00581184
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,0057FCED,?,00580D40,?,00008000), ref: 0058118E
                              • Sleep.KERNEL32(?,?,?,?,?,?,?,0057FCED,?,00580D40,?,00008000), ref: 005811C1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CounterPerformanceQuerySleep
                              • String ID: @X
                              • API String ID: 2875609808-1606808409
                              • Opcode ID: 665939e824bdc969377f9f68799583945eb238bc0a9bc751e7a6d5e21c0f39e7
                              • Instruction ID: c05ef009231dd063cabd81a8fb48854fa63da46d580cee97ab853b42fe51f471
                              • Opcode Fuzzy Hash: 665939e824bdc969377f9f68799583945eb238bc0a9bc751e7a6d5e21c0f39e7
                              • Instruction Fuzzy Hash: AF111831D00919D7CF00AFA5D849AEEBF78FB1A711F004456EE85B2240CB709556DB99
                              APIs
                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0059EC07
                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0059EC37
                              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0059ED6A
                              • CloseHandle.KERNEL32(?), ref: 0059EDEB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Process$CloseCountersHandleInfoMemoryOpen
                              • String ID:
                              • API String ID: 2364364464-0
                              • Opcode ID: 94dbd1ac09aa588f1129bff158b45f7dd6a9253cd738b85ccacbc5b53762b651
                              • Instruction ID: c4d9e612e059674973daba83bc22381596b798599a0f017e7056122b65d88999
                              • Opcode Fuzzy Hash: 94dbd1ac09aa588f1129bff158b45f7dd6a9253cd738b85ccacbc5b53762b651
                              • Instruction Fuzzy Hash: 548161716043119FDB24EF28D84AF2ABBE5BF89710F44881DF9999B3D2D670AC44CB91
                              APIs
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                                • Part of subcall function 005A0E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0059FDAD,?,?), ref: 005A0E31
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 005A00FD
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 005A013C
                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 005A0183
                              • RegCloseKey.ADVAPI32(?,?), ref: 005A01AF
                              • RegCloseKey.ADVAPI32(00000000), ref: 005A01BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                              • String ID:
                              • API String ID: 3440857362-0
                              • Opcode ID: 4026d195f001decb3fd0cdea78f85499fd6bbfd271df68ef017b2e455797db13
                              • Instruction ID: 71b373b72d52884cf5788c7a08f05b57f598cdca83923f3e08f5d3e120cc4ca6
                              • Opcode Fuzzy Hash: 4026d195f001decb3fd0cdea78f85499fd6bbfd271df68ef017b2e455797db13
                              • Instruction Fuzzy Hash: C3518D71218205AFD704EF54DC85EAEBBE8FF86304F40492DF595872A2DB31E944DB52
                              APIs
                                • Part of subcall function 00529837: __itow.LIBCMT ref: 00529862
                                • Part of subcall function 00529837: __swprintf.LIBCMT ref: 005298AC
                              • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0059D927
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0059D9AA
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 0059D9C6
                              • GetProcAddress.KERNEL32(00000000,?), ref: 0059DA07
                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0059DA21
                                • Part of subcall function 00525A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00587896,?,?,00000000), ref: 00525A2C
                                • Part of subcall function 00525A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00587896,?,?,00000000,?,?), ref: 00525A50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                              • String ID:
                              • API String ID: 327935632-0
                              • Opcode ID: 8c00a972268625ed0b318a92cf1d9900b9d26e828a8c49c7b5afe2cb322cbaeb
                              • Instruction ID: 3cebcc8cdf12bd9c82817ebf0470436c1d1cfa658189a8683ec8b84be946b6f2
                              • Opcode Fuzzy Hash: 8c00a972268625ed0b318a92cf1d9900b9d26e828a8c49c7b5afe2cb322cbaeb
                              • Instruction Fuzzy Hash: F9512935A0421ADFCB00EFA8D4889ADBBF4FF5A320B448065E855AB352DB31ED45CF50
                              APIs
                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 0058E61F
                              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 0058E648
                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 0058E687
                                • Part of subcall function 00529837: __itow.LIBCMT ref: 00529862
                                • Part of subcall function 00529837: __swprintf.LIBCMT ref: 005298AC
                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0058E6AC
                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 0058E6B4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                              • String ID:
                              • API String ID: 1389676194-0
                              • Opcode ID: c694ed87504ad99934304641320c6e7d7cad79cc1b14d3ca78ac3a136101b8be
                              • Instruction ID: 56c8c9b5bc33c6fd0c3dda881f5a6c875713b3aadd0beec06fef5fac017c8271
                              • Opcode Fuzzy Hash: c694ed87504ad99934304641320c6e7d7cad79cc1b14d3ca78ac3a136101b8be
                              • Instruction Fuzzy Hash: 63513939A00116DFCB04EF65D985AADBBF5FF4A314F1480A9E809AB3A1DB31ED11DB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a8f9ccc16de418c7681682fe259491ee8c20dfdd6f0c6eb3392cfa6987e550ac
                              • Instruction ID: 95004bcc842c98ee66fa18dd38915cd5f7c626ada66d28a178759410276c7b59
                              • Opcode Fuzzy Hash: a8f9ccc16de418c7681682fe259491ee8c20dfdd6f0c6eb3392cfa6987e550ac
                              • Instruction Fuzzy Hash: BF419E35904244BFD724DB68CC88FADBFA8FB0B310F140565E856A72E1D730AD45EAA1
                              APIs
                              • GetCursorPos.USER32(?), ref: 00522357
                              • ScreenToClient.USER32(005E57B0,?), ref: 00522374
                              • GetAsyncKeyState.USER32(00000001), ref: 00522399
                              • GetAsyncKeyState.USER32(00000002), ref: 005223A7
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: AsyncState$ClientCursorScreen
                              • String ID:
                              • API String ID: 4210589936-0
                              • Opcode ID: c29817e1043e652fb7cadde1aa05a9345458be3b4a8a7d9eb4a36c1c90f199d9
                              • Instruction ID: 19f2c9dbd2f37614eab14c02b3924d8c6f84773f0a1b7e0c4a8da839861278e0
                              • Opcode Fuzzy Hash: c29817e1043e652fb7cadde1aa05a9345458be3b4a8a7d9eb4a36c1c90f199d9
                              • Instruction Fuzzy Hash: 53416F39604215FFDB15DF68C848AEDBFB4BF16361F20471AE829922E0C734A954DB91
                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005763E7
                              • TranslateAcceleratorW.USER32(?,?,?), ref: 00576433
                              • TranslateMessage.USER32(?), ref: 0057645C
                              • DispatchMessageW.USER32(?), ref: 00576466
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00576475
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Message$PeekTranslate$AcceleratorDispatch
                              • String ID:
                              • API String ID: 2108273632-0
                              • Opcode ID: ba559cd30b2516273cf7372004977991dbaf67da1491076ef52f3b9337c5cecd
                              • Instruction ID: b155e4b2cbe3f42b351fd8e075e8439330b4762015c5e3514c126f40b626dc11
                              • Opcode Fuzzy Hash: ba559cd30b2516273cf7372004977991dbaf67da1491076ef52f3b9337c5cecd
                              • Instruction Fuzzy Hash: 8931E471900A82AFDF288FB0ECC4BB67FA9BB11304F148565E569C70A0E7359849FB60
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00578A30
                              • PostMessageW.USER32(?,00000201,00000001), ref: 00578ADA
                              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00578AE2
                              • PostMessageW.USER32(?,00000202,00000000), ref: 00578AF0
                              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00578AF8
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessagePostSleep$RectWindow
                              • String ID:
                              • API String ID: 3382505437-0
                              • Opcode ID: 7dba5317b405e14a45f8cbd00745599299c1a5aa92eb964327c14f19fb9d9f12
                              • Instruction ID: 9f96dc3bbc2dcdfdac8cf6b89b37dd9022773b14dd0d24e48e5afc3703c1ea1b
                              • Opcode Fuzzy Hash: 7dba5317b405e14a45f8cbd00745599299c1a5aa92eb964327c14f19fb9d9f12
                              • Instruction Fuzzy Hash: 4131C471500219EBDF14CFA8E94CAAE3FB5FB15325F108229F929DB1D0C7709914EB90
                              APIs
                              • IsWindowVisible.USER32(?), ref: 0057B204
                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 0057B221
                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0057B259
                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 0057B27F
                              • _wcsstr.LIBCMT ref: 0057B289
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                              • String ID:
                              • API String ID: 3902887630-0
                              • Opcode ID: 5c5fa8cbb89b21b1d374db64a670243fec520620d800c0b06627783d957e1aeb
                              • Instruction ID: 333a1e037dd89ae6cb702d1825de615251d5f7f884dc3fd06d3ca57480ce72eb
                              • Opcode Fuzzy Hash: 5c5fa8cbb89b21b1d374db64a670243fec520620d800c0b06627783d957e1aeb
                              • Instruction Fuzzy Hash: 9921F5756052017AFB155B75AC0DF7F7FACEF89710F108129F808DA1A2EF619C40A3A0
                              APIs
                                • Part of subcall function 00522612: GetWindowLongW.USER32(?,000000EB), ref: 00522623
                              • GetWindowLongW.USER32(?,000000F0), ref: 005AB192
                              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 005AB1B7
                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 005AB1CF
                              • GetSystemMetrics.USER32(00000004), ref: 005AB1F8
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00590E90,00000000), ref: 005AB216
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$Long$MetricsSystem
                              • String ID:
                              • API String ID: 2294984445-0
                              • Opcode ID: 92c65c746aef318b385a5163ce3c1590bfa65d55fb93f95b3aa66e81d525bec2
                              • Instruction ID: 78418c62775d1cfca7bc37f7cda6395996c83e5a1a3d70f759a7b4112eeb7599
                              • Opcode Fuzzy Hash: 92c65c746aef318b385a5163ce3c1590bfa65d55fb93f95b3aa66e81d525bec2
                              • Instruction Fuzzy Hash: 0721AD31A10661AFDB249F789C04B6E3BA4FF17321F204B29B922C71E1E7309820DB90
                              APIs
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00579320
                                • Part of subcall function 00527BCC: _memmove.LIBCMT ref: 00527C06
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00579352
                              • __itow.LIBCMT ref: 0057936A
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00579392
                              • __itow.LIBCMT ref: 005793A3
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$__itow$_memmove
                              • String ID:
                              • API String ID: 2983881199-0
                              • Opcode ID: 601c436acb21d150a87b433e3732b429ccbfe361ab88b7e5f1c692f2fb75687d
                              • Instruction ID: 31d0c81304eec076a24323f7a03ecfeb84752069149cc635d635979eee4514da
                              • Opcode Fuzzy Hash: 601c436acb21d150a87b433e3732b429ccbfe361ab88b7e5f1c692f2fb75687d
                              • Instruction Fuzzy Hash: 0D21D731700219ABDB109FA4AC89EEE7FA9FFDA710F048425FD09E71D1D6B08D45A7A1
                              APIs
                              • IsWindow.USER32(00000000), ref: 00595A6E
                              • GetForegroundWindow.USER32 ref: 00595A85
                              • GetDC.USER32(00000000), ref: 00595AC1
                              • GetPixel.GDI32(00000000,?,00000003), ref: 00595ACD
                              • ReleaseDC.USER32(00000000,00000003), ref: 00595B08
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$ForegroundPixelRelease
                              • String ID:
                              • API String ID: 4156661090-0
                              • Opcode ID: e8a94763a501b8ffcdbce4c3e5e4a3c0d5c72ecad4e884858c076fb62e0ce1b8
                              • Instruction ID: dd99a7404801bf5bca2c7bc849cb0d6f497243909c7275e0cdaf733eaa2f0472
                              • Opcode Fuzzy Hash: e8a94763a501b8ffcdbce4c3e5e4a3c0d5c72ecad4e884858c076fb62e0ce1b8
                              • Instruction Fuzzy Hash: DD21C335A00104AFDB14EFA4DC88AAABBF5FF99311F148479F909D7362DA30AC04DB90
                              APIs
                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0052134D
                              • SelectObject.GDI32(?,00000000), ref: 0052135C
                              • BeginPath.GDI32(?), ref: 00521373
                              • SelectObject.GDI32(?,00000000), ref: 0052139C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ObjectSelect$BeginCreatePath
                              • String ID:
                              • API String ID: 3225163088-0
                              • Opcode ID: 9da93526d6102adffe8b426fcd9587735d48959ad074923272712c9b4bfa30d6
                              • Instruction ID: abc1487d40eb1ad0b8717a55b9cc91264dbcef6d93487d91d16b029269000c16
                              • Opcode Fuzzy Hash: 9da93526d6102adffe8b426fcd9587735d48959ad074923272712c9b4bfa30d6
                              • Instruction Fuzzy Hash: 0721B231804A54EFDB10CF24EC8876A3FA9FB31315F244626F8419A0F0E7B08899EF94
                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 00584ABA
                              • __beginthreadex.LIBCMT ref: 00584AD8
                              • MessageBoxW.USER32(?,?,?,?), ref: 00584AED
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00584B03
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00584B0A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                              • String ID:
                              • API String ID: 3824534824-0
                              • Opcode ID: 38ee996f15252f221d0ed211bfacbea16315132c1def391069cbe9a31622d4c1
                              • Instruction ID: f13fd34156a18b1845ab52d78f858c1fbea7462831fe632afc8705fe8cd6691c
                              • Opcode Fuzzy Hash: 38ee996f15252f221d0ed211bfacbea16315132c1def391069cbe9a31622d4c1
                              • Instruction Fuzzy Hash: 9B114876904245BBCB04AFA8EC48A9B7FADFB55325F144269FD14E3250E771C9088BA0
                              APIs
                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 0057821E
                              • GetLastError.KERNEL32(?,00577CE2,?,?,?), ref: 00578228
                              • GetProcessHeap.KERNEL32(00000008,?,?,00577CE2,?,?,?), ref: 00578237
                              • RtlAllocateHeap.NTDLL(00000000,?,00577CE2), ref: 0057823E
                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00578255
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: HeapObjectSecurityUser$AllocateErrorLastProcess
                              • String ID:
                              • API String ID: 883493501-0
                              • Opcode ID: bca70939ed6de73157836e8b306f621e647ae4f95a1a054c85ad2fd9e02cbebd
                              • Instruction ID: 58b45d89193b5f682bb1ed890387db9485f5c3a040d462bef5e0d0d7fc605b56
                              • Opcode Fuzzy Hash: bca70939ed6de73157836e8b306f621e647ae4f95a1a054c85ad2fd9e02cbebd
                              • Instruction Fuzzy Hash: 3B014675280204AFDB204FA6EC4CD6B7FADFF9A756B504469F809C3220DA318C04EB60
                              APIs
                              • CLSIDFromProgID.COMBASE ref: 00577127
                              • ProgIDFromCLSID.COMBASE(?,00000000), ref: 00577142
                              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00577044,80070057,?,?), ref: 00577150
                              • CoTaskMemFree.COMBASE(00000000), ref: 00577160
                              • CLSIDFromString.COMBASE(?,?), ref: 0057716C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: From$Prog$FreeStringTasklstrcmpi
                              • String ID:
                              • API String ID: 3897988419-0
                              • Opcode ID: b7bb9c0994f341047fc783afb504312102950c4bb94a08ed0d291780d3735693
                              • Instruction ID: 75260d873441d450fdc213f002b4045ed1cb4742598b9a3a170faf4af0725a79
                              • Opcode Fuzzy Hash: b7bb9c0994f341047fc783afb504312102950c4bb94a08ed0d291780d3735693
                              • Instruction Fuzzy Hash: F3017C76601209AFDB114FA4FC44AAA7FADFB49791F1481B4FD08D2220DB75DD40EBA0
                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00585260
                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 0058526E
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00585276
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00585280
                              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 005852BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: PerformanceQuery$CounterSleep$Frequency
                              • String ID:
                              • API String ID: 2833360925-0
                              • Opcode ID: dd20c0d0c1ef8a4ada47d3d958d728eb8d8a2099f0c5b23b3fcfa74cb5fbba5e
                              • Instruction ID: 19ab0d206db618419f611bcf4ffb2019abf77b177e98c482085c3a8888b193f5
                              • Opcode Fuzzy Hash: dd20c0d0c1ef8a4ada47d3d958d728eb8d8a2099f0c5b23b3fcfa74cb5fbba5e
                              • Instruction Fuzzy Hash: 66015739D01A29DBDF00EFE4E848AEDBF78BB19311F400566E982B2140DF305958DBA1
                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00578121
                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0057812B
                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0057813A
                              • RtlAllocateHeap.NTDLL(00000000,?,TokenIntegrityLevel), ref: 00578141
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00578157
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocateErrorLastProcess
                              • String ID:
                              • API String ID: 47921759-0
                              • Opcode ID: d382cd243c7ba590851e6a1cb3a7fcf7ee9c38a7830ebc62a8f13dc89dad2e6e
                              • Instruction ID: 46e6391d87265c51adb62fd6ac7d86768971b608979a0a4de7f8de8c7107dc90
                              • Opcode Fuzzy Hash: d382cd243c7ba590851e6a1cb3a7fcf7ee9c38a7830ebc62a8f13dc89dad2e6e
                              • Instruction Fuzzy Hash: F9F03C71340304AFEB110FA5EC8CE7B3BACFF4A655B404025F94986150CF619945EB60
                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 0057C1F7
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 0057C20E
                              • MessageBeep.USER32(00000000), ref: 0057C226
                              • KillTimer.USER32(?,0000040A), ref: 0057C242
                              • EndDialog.USER32(?,00000001), ref: 0057C25C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                              • String ID:
                              • API String ID: 3741023627-0
                              • Opcode ID: b1523e3c7d4f66011a615f589ffd417915f56e331152a5c7477434344067839d
                              • Instruction ID: b070d2c997570ee60cd8b1f5bc75c1cd4f8a4f79ddd2167a4b92ce5d657763ff
                              • Opcode Fuzzy Hash: b1523e3c7d4f66011a615f589ffd417915f56e331152a5c7477434344067839d
                              • Instruction Fuzzy Hash: 5A01A234404304ABEB205FA0ED4EF967FB8FF11B06F00466DA5C6A24E1DBE06948AB90
                              APIs
                              • EndPath.GDI32(?), ref: 005213BF
                              • StrokeAndFillPath.GDI32(?,?,0055B888,00000000,?), ref: 005213DB
                              • SelectObject.GDI32(?,00000000), ref: 005213EE
                              • DeleteObject.GDI32 ref: 00521401
                              • StrokePath.GDI32(?), ref: 0052141C
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Path$ObjectStroke$DeleteFillSelect
                              • String ID:
                              • API String ID: 2625713937-0
                              • Opcode ID: 9585e99315ec63ee771ccb98c8d6aeec7437e863b41c35bd3646722c1bcb174c
                              • Instruction ID: 05b01307439d5a7c57a814f9ec6c3611bad2a228a05d3ab31ffe271512be2c4f
                              • Opcode Fuzzy Hash: 9585e99315ec63ee771ccb98c8d6aeec7437e863b41c35bd3646722c1bcb174c
                              • Instruction Fuzzy Hash: 37F0CD30008A48DBDB195F66EC8C7593FA5BB3232AF188224E5AA490F1D771459DEF54
                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0057899D
                              • CloseHandle.KERNEL32(?), ref: 005789B2
                              • CloseHandle.KERNEL32(?), ref: 005789BA
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 005789C3
                              • HeapFree.KERNEL32(00000000), ref: 005789CA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CloseHandleHeap$FreeObjectProcessSingleWait
                              • String ID:
                              • API String ID: 3751786701-0
                              • Opcode ID: 40fa2ed2e96c30830c0c3096a780a0dc95788ccd3ba01a0079ea3fb199ca1abe
                              • Instruction ID: f259290f2e9e2bcbee263662e06a61722d1bf11502bd9a5a607436ad774fbef2
                              • Opcode Fuzzy Hash: 40fa2ed2e96c30830c0c3096a780a0dc95788ccd3ba01a0079ea3fb199ca1abe
                              • Instruction Fuzzy Hash: 13E05276104505FFDB011FE5EC0C95ABB69FBAA762B508631F21981470CB329469EB90
                              APIs
                                • Part of subcall function 00540DB6: std::exception::exception.LIBCMT ref: 00540DEC
                                • Part of subcall function 00540DB6: __CxxThrowException@8.LIBCMT ref: 00540E01
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                                • Part of subcall function 00527A51: _memmove.LIBCMT ref: 00527AAB
                              • __swprintf.LIBCMT ref: 00532ECD
                              Strings
                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00532D66
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                              • API String ID: 1943609520-557222456
                              • Opcode ID: f1e2c25e22795c39b00b18ff7f25f6042256edc5d027ded462ea664adeb93d71
                              • Instruction ID: 7498173c5e5cdbf38396f58ef9531f8ad5963ca7f1aba6793a668e0b2613f527
                              • Opcode Fuzzy Hash: f1e2c25e22795c39b00b18ff7f25f6042256edc5d027ded462ea664adeb93d71
                              • Instruction Fuzzy Hash: 80913A715087169FC714EF24D89AC6EBFA8FF8A710F00491DF5969B2A1EA30ED44CB52
                              APIs
                                • Part of subcall function 00524750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00524743,?,?,005237AE,?), ref: 00524770
                              • CoInitialize.OLE32(00000000), ref: 0058B9BB
                              • CoCreateInstance.COMBASE(005B2D6C,00000000,00000001,005B2BDC,?), ref: 0058B9D4
                              • CoUninitialize.COMBASE ref: 0058B9F1
                                • Part of subcall function 00529837: __itow.LIBCMT ref: 00529862
                                • Part of subcall function 00529837: __swprintf.LIBCMT ref: 005298AC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                              • String ID: .lnk
                              • API String ID: 2126378814-24824748
                              • Opcode ID: f2bcc261a63f30da2a9dad0c870dac9373908f1c3cefb2b955c3de467602763b
                              • Instruction ID: 5885c8bc36ea52a907fa565310e12601072a6ea1bd0ca86a1cc1fc2452fa72cb
                              • Opcode Fuzzy Hash: f2bcc261a63f30da2a9dad0c870dac9373908f1c3cefb2b955c3de467602763b
                              • Instruction Fuzzy Hash: 82A17A756043129FDB14EF14C484D6ABBE9FF8A314F048998F899AB3A1CB31ED45CB91
                              APIs
                              • OleSetContainedObject.OLE32(?,00000001), ref: 0057B4BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ContainedObject
                              • String ID: AutoIt3GUI$Container$%[
                              • API String ID: 3565006973-249053226
                              • Opcode ID: 61db4d18f4eabc6d785adb1f21c1cfb483526cdf2bc72a7349468f9d46c7080e
                              • Instruction ID: 5a91b60d080577a8e49887901d5baba28b47ae3d5db08d265a8af59ca89ac223
                              • Opcode Fuzzy Hash: 61db4d18f4eabc6d785adb1f21c1cfb483526cdf2bc72a7349468f9d46c7080e
                              • Instruction Fuzzy Hash: 12913A70600601AFEB14DF68D884B6ABBF5FF49714F20856EF94ACB291EB71E841DB50
                              APIs
                              • __startOneArgErrorHandling.LIBCMT ref: 005450AD
                                • Part of subcall function 005500F0: __87except.LIBCMT ref: 0055012B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ErrorHandling__87except__start
                              • String ID: pow
                              • API String ID: 2905807303-2276729525
                              • Opcode ID: 737df89aa651fc99c45d2394c5c3f68857e96858f18a72b7cb386bb74636783c
                              • Instruction ID: d4df99d5c6d9ac025a4de9f7de5d72121b388a22d8626a7a3d37e56006198133
                              • Opcode Fuzzy Hash: 737df89aa651fc99c45d2394c5c3f68857e96858f18a72b7cb386bb74636783c
                              • Instruction Fuzzy Hash: 2F517035908A0687DB117B14CC2D3BE2F90BB80705F205D5AE8D9861DBFE348DCCDA86
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: 3cS$_S
                              • API String ID: 4104443479-3431193023
                              • Opcode ID: ecb9d526df9f95372d5c92470285efda91a4c363a5943603f5cb6c205db4202f
                              • Instruction ID: 3c1329e02ee3dd4686de4771496d35f4b4c663ddd1a8aa64e6158221327d49d8
                              • Opcode Fuzzy Hash: ecb9d526df9f95372d5c92470285efda91a4c363a5943603f5cb6c205db4202f
                              • Instruction Fuzzy Hash: 27514D70E006099FCF24CFA8C884ABEBBB1FF55304F248529E85AD7250EB31A955CF51
                              APIs
                                • Part of subcall function 005814BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00579296,?,?,00000034,00000800,?,00000034), ref: 005814E6
                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 0057983F
                                • Part of subcall function 00581487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005792C5,?,?,00000800,?,00001073,00000000,?,?), ref: 005814B1
                                • Part of subcall function 005813DE: GetWindowThreadProcessId.USER32(?,?), ref: 00581409
                                • Part of subcall function 005813DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,0057925A,00000034,?,?,00001004,00000000,00000000), ref: 00581419
                                • Part of subcall function 005813DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,0057925A,00000034,?,?,00001004,00000000,00000000), ref: 0058142F
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 005798AC
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 005798F9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                              • String ID: @
                              • API String ID: 4150878124-2766056989
                              • Opcode ID: d9b7fcb7afa6661de54cbdd7e3e6548a97b81af4ec382b39b37def1b80a3b492
                              • Instruction ID: 16d03349ff2262ee1efa64999147734270e478514a4131ddb355256fb9fcdc52
                              • Opcode Fuzzy Hash: d9b7fcb7afa6661de54cbdd7e3e6548a97b81af4ec382b39b37def1b80a3b492
                              • Instruction Fuzzy Hash: E0416E76900219BFDF10EFA4CC85ADEBBB8FB49300F004099FA45B7191DA716E45DBA1
                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,005AF910,00000000,?,?,?,?), ref: 005A79DF
                              • GetWindowLongW.USER32 ref: 005A79FC
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005A7A0C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$Long
                              • String ID: SysTreeView32
                              • API String ID: 847901565-1698111956
                              • Opcode ID: adae23e23716d0c69f108f45340cc05cc3fc0e109566be9727495e31ec0ea10f
                              • Instruction ID: a27d15292693c94fea29f39d83473764fc1f2642437dfa0631e229f87ab841a5
                              • Opcode Fuzzy Hash: adae23e23716d0c69f108f45340cc05cc3fc0e109566be9727495e31ec0ea10f
                              • Instruction Fuzzy Hash: 6331CE3120460AAFDB118E78DC45BEB7BA9FF4A324F208725F875922E0D730ED509B50
                              APIs
                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 005A7461
                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 005A7475
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 005A7499
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$Window
                              • String ID: SysMonthCal32
                              • API String ID: 2326795674-1439706946
                              • Opcode ID: e2156e59fd2062934464b110b0e31d09bebcef0c3990969a586e011cc1523bb6
                              • Instruction ID: a696e6a766ce2ee62a54b94457efa6e9d5a5ecf6308164391d8da86dd22644ca
                              • Opcode Fuzzy Hash: e2156e59fd2062934464b110b0e31d09bebcef0c3990969a586e011cc1523bb6
                              • Instruction Fuzzy Hash: 5A21B132500219ABDF118EA4CC46FEE3F69FF8D724F110114FE156B1D0DA75AC559BA0
                              APIs
                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 005A6D3B
                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 005A6D4B
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 005A6D70
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend$MoveWindow
                              • String ID: Listbox
                              • API String ID: 3315199576-2633736733
                              • Opcode ID: ee1555a664a54ac513a5095d8ef050dbe1b7fe7c5012e58d609fcf03cac62570
                              • Instruction ID: 6bc327b5edea89fd29535e423a7bcd89907d8567a78fa5622a1b727de2bcf67b
                              • Opcode Fuzzy Hash: ee1555a664a54ac513a5095d8ef050dbe1b7fe7c5012e58d609fcf03cac62570
                              • Instruction Fuzzy Hash: A4218032610118BFDF158F54DC45EAF3BAAFF8A760F058124FA459B1A0C6719C519BA0
                              APIs
                              • __snwprintf.LIBCMT ref: 00593A66
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __snwprintf_memmove
                              • String ID: , $$AUTOITCALLVARIABLE%d$%[
                              • API String ID: 3506404897-741242068
                              • Opcode ID: d15c86547e6253e816a3a4406e533909fe8c2fc41f45e654a78a926645694210
                              • Instruction ID: 5f8a99ee20955743ebbef35e5959287f576c05c160f33bdd49798efdc8fbba53
                              • Opcode Fuzzy Hash: d15c86547e6253e816a3a4406e533909fe8c2fc41f45e654a78a926645694210
                              • Instruction Fuzzy Hash: 6D21503160022AEFCF10EFA4DC86AAE7FB5BF89700F504455E555AB291DA30EA45CB61
                              APIs
                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 005A7772
                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 005A7787
                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 005A7794
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: msctls_trackbar32
                              • API String ID: 3850602802-1010561917
                              • Opcode ID: 98cd3454500bcd8a34a8f8bb0681d35b687cbb993c9ec845ff6da3f0d6670e83
                              • Instruction ID: 8398c71fa40ca85829179f5afe38e7fafda543de35bab083b9140bf7fc371fe9
                              • Opcode Fuzzy Hash: 98cd3454500bcd8a34a8f8bb0681d35b687cbb993c9ec845ff6da3f0d6670e83
                              • Instruction Fuzzy Hash: BF112332204209BAEF245F64DC05FEB3BA9FF8EB54F010129FA41A60A0D272E811DB20
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __calloc_crt
                              • String ID: ]$@B^
                              • API String ID: 3494438863-2679402885
                              • Opcode ID: 3e06157a789f801e38aa6892fe5947dd3d56ea016fa92ff17cd979adc402cf03
                              • Instruction ID: f88fff1bcceee935765de2b0499f6acb6e7a197f31d662f7f55e696f0e296fad
                              • Opcode Fuzzy Hash: 3e06157a789f801e38aa6892fe5947dd3d56ea016fa92ff17cd979adc402cf03
                              • Instruction Fuzzy Hash: 1AF0A475604A128BF7299F18BCA2BE62FD5F75133CB10041BE340CE280FB3088449681
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00524AD0), ref: 00524B45
                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00524B57
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetNativeSystemInfo$kernel32.dll
                              • API String ID: 2574300362-192647395
                              • Opcode ID: 4ba00842b0c3d53b9f051061a05d32951c68c56e0c0029d307e0e7f84323d071
                              • Instruction ID: 2c6592296a82ab1f323b922d67357e6634960a5cab581d1de091638674b17682
                              • Opcode Fuzzy Hash: 4ba00842b0c3d53b9f051061a05d32951c68c56e0c0029d307e0e7f84323d071
                              • Instruction Fuzzy Hash: C3D01234A10727CFDB209FB1E858B467AE4BF17351B118839D4C6D6190D670D480CF64
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00524BD0,?,00524DEF,?,005E52F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00524C11
                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00524C23
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                              • API String ID: 2574300362-3689287502
                              • Opcode ID: 2569916c0aaece91b96dde0b0c1a8d3026a98bebcbfea5c4eb7ef789b836c817
                              • Instruction ID: eab64be0f4452f7a18d99cdc8b49ee34bc846a6e6b8ed2a47242fb120bf027be
                              • Opcode Fuzzy Hash: 2569916c0aaece91b96dde0b0c1a8d3026a98bebcbfea5c4eb7ef789b836c817
                              • Instruction Fuzzy Hash: DED01230511723CFD720AFB5ED48646BEE5FF1A352B118C3AD485D6190E6B0D880CB60
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00524B83,?), ref: 00524C44
                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00524C56
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                              • API String ID: 2574300362-1355242751
                              • Opcode ID: 7f80ff30e4a27e42582447068284f49c457bb35d7948f53bd6a80da2f9ee12ef
                              • Instruction ID: 93018dce92ab62808ff2ea63ace831825d4563af70ad2a1384fc97640830d046
                              • Opcode Fuzzy Hash: 7f80ff30e4a27e42582447068284f49c457bb35d7948f53bd6a80da2f9ee12ef
                              • Instruction Fuzzy Hash: ABD01730510723CFD7209FB9E94864A7BE4BF16351F11883AD496E62A0E670D880CB60
                              APIs
                              • LoadLibraryA.KERNEL32(advapi32.dll,?,005A1039), ref: 005A0DF5
                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 005A0E07
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: RegDeleteKeyExW$advapi32.dll
                              • API String ID: 2574300362-4033151799
                              • Opcode ID: 961a59df25f42cf7235323652a9f7c11908bc2f7df678183c805cba717bce331
                              • Instruction ID: b311ae7bded1a48482f52065d2828e5937221694113a76d9d76207e5a6c65e74
                              • Opcode Fuzzy Hash: 961a59df25f42cf7235323652a9f7c11908bc2f7df678183c805cba717bce331
                              • Instruction Fuzzy Hash: 0DD01270550712CFD7209FB5D8486467AD9BF26352F119C7FD485D6290D6B0D490D750
                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00598CF4,?,005AF910), ref: 005990EE
                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00599100
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetModuleHandleExW$kernel32.dll
                              • API String ID: 2574300362-199464113
                              • Opcode ID: dc6e4d07e6dbe4f2db9e64d9918e30c442bab11faf29cbca10b9c1e8c0f2f3dc
                              • Instruction ID: ae54bea39334c9168a603c77ff93b087f51378e22e955ee9e7711f9933412e94
                              • Opcode Fuzzy Hash: dc6e4d07e6dbe4f2db9e64d9918e30c442bab11faf29cbca10b9c1e8c0f2f3dc
                              • Instruction Fuzzy Hash: B6D01734510713CFDB209FB9D8586467AE4BF16352B168C3ED486D6690EB70C880DBA0
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: LocalTime__swprintf
                              • String ID: %.3d$WIN_XPe
                              • API String ID: 2070861257-2409531811
                              • Opcode ID: 2aa3c964e34093e425c20184ecaf78ac636ef73010fe497ff436ff62dae09303
                              • Instruction ID: 4900fc7b456aca4c008963ae67e551a7fb182adae95b83a9bf278f7dd50bf865
                              • Opcode Fuzzy Hash: 2aa3c964e34093e425c20184ecaf78ac636ef73010fe497ff436ff62dae09303
                              • Instruction Fuzzy Hash: A5D01771804519EACB549A909C888F97F7CFB19301F180962B406E3080E226AB94EA29
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f196a2d0453514c6ca42280da3db1f9d2ac518f05dbc8397510defaf5fbdb93a
                              • Instruction ID: ba1c9a13ed8fba2a2bc84b0d49e6225571760152380c7dbfa3a83bf66aa7b064
                              • Opcode Fuzzy Hash: f196a2d0453514c6ca42280da3db1f9d2ac518f05dbc8397510defaf5fbdb93a
                              • Instruction Fuzzy Hash: 96C16274A0421AEFCB14CFA4E884DAEBBB5FF4C714B158998E809DB251D730DD41EB90
                              APIs
                              • CharLowerBuffW.USER32(?,?), ref: 0059E0BE
                              • CharLowerBuffW.USER32(?,?), ref: 0059E101
                                • Part of subcall function 0059D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0059D7C5
                              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0059E301
                              • _memmove.LIBCMT ref: 0059E314
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: BuffCharLower$AllocVirtual_memmove
                              • String ID:
                              • API String ID: 3659485706-0
                              • Opcode ID: f6db6e6c85810c24fc07e1fea34f9457ac1f46e565071bf42c29114c83a12b9c
                              • Instruction ID: 28963d5e1c7c18e13d981de2385d828a77fe49fb64339fa04da278f1e5e5e14e
                              • Opcode Fuzzy Hash: f6db6e6c85810c24fc07e1fea34f9457ac1f46e565071bf42c29114c83a12b9c
                              • Instruction Fuzzy Hash: 86C15971608311DFCB04DF28C485A6ABBE4FF89714F14896DF8999B391D731E946CB82
                              APIs
                              • CoInitialize.OLE32(00000000), ref: 005980C3
                              • CoUninitialize.COMBASE ref: 005980CE
                                • Part of subcall function 0057D56C: CoCreateInstance.COMBASE(?,00000000,00000005,?,?), ref: 0057D5D4
                              • VariantInit.OLEAUT32(?), ref: 005980D9
                              • VariantClear.OLEAUT32(?), ref: 005983AA
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                              • String ID:
                              • API String ID: 780911581-0
                              • Opcode ID: 4736af7d0688418116ba19e158092bbe62a6eefead255f3460c80fdad12b6aa9
                              • Instruction ID: 3078221dd348db69288af638844f693473f8918d146524dbed2ce9ff3e109b85
                              • Opcode Fuzzy Hash: 4736af7d0688418116ba19e158092bbe62a6eefead255f3460c80fdad12b6aa9
                              • Instruction Fuzzy Hash: F3A17D756047129FCB04DF64C885B2ABBE4BF8A714F18485CF9969B3A1CB34EC45CB86
                              APIs
                              • ProgIDFromCLSID.COMBASE(?,00000000), ref: 005776EA
                              • CoTaskMemFree.COMBASE(00000000), ref: 00577702
                              • CLSIDFromProgID.COMBASE(?,?), ref: 00577727
                              • _memcmp.LIBCMT ref: 00577748
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: FromProg$FreeTask_memcmp
                              • String ID:
                              • API String ID: 314563124-0
                              • Opcode ID: 9b34263780c725e0bea2f52d4656295fea7833360f46bd5c045edbc11b415953
                              • Instruction ID: b64ee4345f1a45927da7bc90a20ce5ef8261bc7424d16410ebfa98f67876b38f
                              • Opcode Fuzzy Hash: 9b34263780c725e0bea2f52d4656295fea7833360f46bd5c045edbc11b415953
                              • Instruction Fuzzy Hash: 3B81FD75A00109EFCB04DFA4D988DEEBBB9FF89315F208558E505AB250DB71AE06DB60
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Variant$AllocClearCopyInitString
                              • String ID:
                              • API String ID: 2808897238-0
                              • Opcode ID: 59809ab3761342341bfddd519ddb152811573d52a546278cf80894860ff219e7
                              • Instruction ID: a4b346efd1d5941aae218ac29b58ba748037fc682511f22a9f8ac72e589b4db1
                              • Opcode Fuzzy Hash: 59809ab3761342341bfddd519ddb152811573d52a546278cf80894860ff219e7
                              • Instruction Fuzzy Hash: EC51D774704B02DECF24AF65E89962ABBE5BF45310F20D81FE58EE7291DA30D840A701
                              APIs
                              • GetWindowRect.USER32(00FBEE60,?), ref: 005A9863
                              • ScreenToClient.USER32(00000002,00000002), ref: 005A9896
                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 005A9903
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$ClientMoveRectScreen
                              • String ID:
                              • API String ID: 3880355969-0
                              • Opcode ID: 80cc2af09bbdc1a8c62cbecc0e6380f193e22686cb11bcfdf21a89c754156812
                              • Instruction ID: 5238936009b411f7d672dd53e8df892223450b2d390372126d164ecdb1a0700b
                              • Opcode Fuzzy Hash: 80cc2af09bbdc1a8c62cbecc0e6380f193e22686cb11bcfdf21a89c754156812
                              • Instruction Fuzzy Hash: 79514E34A00219EFCF14CF64D884AAE7FB6FF56360F248169F9559B2A0D730AD41DB90
                              APIs
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 0058B89E
                              • GetLastError.KERNEL32(?,00000000), ref: 0058B8C4
                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 0058B8E9
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0058B915
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CreateHardLink$DeleteErrorFileLast
                              • String ID:
                              • API String ID: 3321077145-0
                              • Opcode ID: 9acb17c7097c3b9b28237211543edffdd10a408ace00e994a76b408561dd7b9e
                              • Instruction ID: 6896e8b6abd1a5550df4a00ea7c2cfed4227ebedd45a0f552684f7534a44452b
                              • Opcode Fuzzy Hash: 9acb17c7097c3b9b28237211543edffdd10a408ace00e994a76b408561dd7b9e
                              • Instruction Fuzzy Hash: 5E411A39600511DFCB14EF55D488A59BBE5BF8A310F098098ED4AAB3A2CB30FD01DB95
                              APIs
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 005A88DE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: InvalidateRect
                              • String ID:
                              • API String ID: 634782764-0
                              • Opcode ID: 967c5b37c7a65b61139aa187329254089c9e522542368c6cb4995b8a1faa85a3
                              • Instruction ID: 122a2a5c5bf05c7a373c87c7e74026c80377f16930b1925ac17df0f1b1b5e3ec
                              • Opcode Fuzzy Hash: 967c5b37c7a65b61139aa187329254089c9e522542368c6cb4995b8a1faa85a3
                              • Instruction Fuzzy Hash: 8C31D234600109AFEB249A58CC85BBE7FB5FB07310F944912FA51E61A1DE74E940A792
                              APIs
                              • ClientToScreen.USER32(?,?), ref: 005AAB60
                              • GetWindowRect.USER32(?,?), ref: 005AABD6
                              • PtInRect.USER32(?,?,005AC014), ref: 005AABE6
                              • MessageBeep.USER32(00000000), ref: 005AAC57
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Rect$BeepClientMessageScreenWindow
                              • String ID:
                              • API String ID: 1352109105-0
                              • Opcode ID: 1d92ff0aed70d677b7a4e85a33954e57824bc096b184f77750fea9077c60b88c
                              • Instruction ID: 08ef2ec524772043f7b59f3f9e6e4d3e9393d752ba233ba9da0f5265615d792e
                              • Opcode Fuzzy Hash: 1d92ff0aed70d677b7a4e85a33954e57824bc096b184f77750fea9077c60b88c
                              • Instruction Fuzzy Hash: 4B418C30600209DFDB11DF58C894A6D7BF5FB4A320F2480A9F9559F260E730AC45DB92
                              APIs
                              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00580B27
                              • SetKeyboardState.USER32(00000080,?,00000001), ref: 00580B43
                              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00580BA9
                              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00580BFB
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: 1e6c4b83a5606910bcaecc514292ef2d3b0cb0e543d4f28600212cbda4710727
                              • Instruction ID: 2fab622546fc16ade56b9f07e20afa90b6d26419b36c6405a4b64e6b37d72d66
                              • Opcode Fuzzy Hash: 1e6c4b83a5606910bcaecc514292ef2d3b0cb0e543d4f28600212cbda4710727
                              • Instruction Fuzzy Hash: A4315A30E40218AFFF70AB658C09BFEBFA9BB45326F04925AEC91721D1C3748D499751
                              APIs
                              • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00580C66
                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00580C82
                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 00580CE1
                              • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00580D33
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: 252ed86d816a57ce704e97a109dde1a4f782515eacfbcda60709edd0da8cd271
                              • Instruction ID: 4904d4a0980510c31c08888c406d74d6d5f32da081a1829ea668971f27ab8c9f
                              • Opcode Fuzzy Hash: 252ed86d816a57ce704e97a109dde1a4f782515eacfbcda60709edd0da8cd271
                              • Instruction Fuzzy Hash: 50313530941218AEFF70AEA5C8097BEFF6ABB89310F04972AEC85721D1C3359D4D9751
                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 005561FB
                              • __isleadbyte_l.LIBCMT ref: 00556229
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00556257
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 0055628D
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: ec7f589a153fe1a0d109a2915397b2a14ce50423c9317bee548b3098f84ed498
                              • Instruction ID: 3207df8f2adf0131693902d656ad8539373ef63f3e78be41f186c06a17a17fae
                              • Opcode Fuzzy Hash: ec7f589a153fe1a0d109a2915397b2a14ce50423c9317bee548b3098f84ed498
                              • Instruction Fuzzy Hash: 3331EF34600286AFDF218F64CC58BBA7FA9FF82312F55412AEC20871A1DB30D958DB90
                              APIs
                              • GetForegroundWindow.USER32 ref: 005A4F02
                                • Part of subcall function 00583641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0058365B
                                • Part of subcall function 00583641: GetCurrentThreadId.KERNEL32 ref: 00583662
                                • Part of subcall function 00583641: AttachThreadInput.USER32(00000000,?,00585005), ref: 00583669
                              • GetCaretPos.USER32(?), ref: 005A4F13
                              • ClientToScreen.USER32(00000000,?), ref: 005A4F4E
                              • GetForegroundWindow.USER32 ref: 005A4F54
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                              • String ID:
                              • API String ID: 2759813231-0
                              • Opcode ID: f6fd334aa3f31275ab586f1394c51a1e2e8a2e689a450916485239aa6485c0f2
                              • Instruction ID: 34daa249e11de83e460a8497ddceaee2eb3d83946a31e002b05091fa8bec97b5
                              • Opcode Fuzzy Hash: f6fd334aa3f31275ab586f1394c51a1e2e8a2e689a450916485239aa6485c0f2
                              • Instruction Fuzzy Hash: 47310C72D00119AFDB04EFA5D8859EFBBF9FF99300F10446AE815E7241EA759E058BA0
                              APIs
                                • Part of subcall function 0057810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00578121
                                • Part of subcall function 0057810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 0057812B
                                • Part of subcall function 0057810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 0057813A
                                • Part of subcall function 0057810A: RtlAllocateHeap.NTDLL(00000000,?,TokenIntegrityLevel), ref: 00578141
                                • Part of subcall function 0057810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00578157
                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 005786A3
                              • _memcmp.LIBCMT ref: 005786C6
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005786FC
                              • HeapFree.KERNEL32(00000000), ref: 00578703
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Heap$InformationProcessToken$AllocateErrorFreeLastLookupPrivilegeValue_memcmp
                              • String ID:
                              • API String ID: 2182266621-0
                              • Opcode ID: a739730205f5cfc65be58fd1e08279223143873e861020dd81f380cbabbc267a
                              • Instruction ID: fedad3c7e0b748c298e54dd8e89e9a533996b6b78ba4d819e066aa16fcbab7dc
                              • Opcode Fuzzy Hash: a739730205f5cfc65be58fd1e08279223143873e861020dd81f380cbabbc267a
                              • Instruction Fuzzy Hash: E5216B71E80109EBDB10DFA4D949BFEBBB8FF55344F158059E448AB241DB31AE05EB60
                              APIs
                              • __setmode.LIBCMT ref: 005409AE
                                • Part of subcall function 00525A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00587896,?,?,00000000), ref: 00525A2C
                                • Part of subcall function 00525A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00587896,?,?,00000000,?,?), ref: 00525A50
                              • _fprintf.LIBCMT ref: 005409E5
                              • OutputDebugStringW.KERNEL32(?), ref: 00575DBB
                                • Part of subcall function 00544AAA: _flsall.LIBCMT ref: 00544AC3
                              • __setmode.LIBCMT ref: 00540A1A
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                              • String ID:
                              • API String ID: 521402451-0
                              • Opcode ID: 736211371988f091124cefe36f7f25720f0703d1721db944a378114cfcee7b1e
                              • Instruction ID: 4fce606ba1594dda0b62c759cc8faf509d6674d3b69906018e1cd66337d2ea9f
                              • Opcode Fuzzy Hash: 736211371988f091124cefe36f7f25720f0703d1721db944a378114cfcee7b1e
                              • Instruction Fuzzy Hash: 7E11F3319442066BDB04B6A4AC4BAFE7F68BF92324F644055F205A71C2EE7059469BA4
                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 005917A3
                                • Part of subcall function 0059182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0059184C
                                • Part of subcall function 0059182D: InternetCloseHandle.WININET(00000000), ref: 005918E9
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Internet$CloseConnectHandleOpen
                              • String ID:
                              • API String ID: 1463438336-0
                              • Opcode ID: a671210bf3de62da52640db95e71f4ad3ca184dad66a122c5e7f335a6d9905fd
                              • Instruction ID: 5e624ff83e2b9c688d72aac6b77ecce8f23e4350b0eb5ac801a81fedfa067744
                              • Opcode Fuzzy Hash: a671210bf3de62da52640db95e71f4ad3ca184dad66a122c5e7f335a6d9905fd
                              • Instruction Fuzzy Hash: B921F631200A13BFEF129FA0DC00FBABFA9FF89710F10442AF91596650DB71D811ABA4
                              APIs
                              • _free.LIBCMT ref: 00555101
                                • Part of subcall function 0054571C: __FF_MSGBANNER.LIBCMT ref: 00545733
                                • Part of subcall function 0054571C: __NMSG_WRITE.LIBCMT ref: 0054573A
                                • Part of subcall function 0054571C: RtlAllocateHeap.NTDLL(00FA0000,00000000,00000001), ref: 0054575F
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: AllocateHeap_free
                              • String ID:
                              • API String ID: 614378929-0
                              • Opcode ID: 215db15b4af215499ff0958ed13d3dd58ff4eb74184910869f503809dd2fbea2
                              • Instruction ID: 5f925da134d2b641a6a739fa019c414728b2b433a43dfba355c1f3f46f6c9189
                              • Opcode Fuzzy Hash: 215db15b4af215499ff0958ed13d3dd58ff4eb74184910869f503809dd2fbea2
                              • Instruction Fuzzy Hash: 5C119471900E12AFCF252F74A86D7AD3F98BB553A6B10092BFD859A161EE308948D790
                              APIs
                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 005785E2
                              • OpenProcessToken.ADVAPI32(00000000), ref: 005785E9
                              • CloseHandle.KERNEL32(00000004), ref: 00578603
                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00578632
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Process$CloseCreateCurrentHandleLogonOpenTokenWith
                              • String ID:
                              • API String ID: 2621361867-0
                              • Opcode ID: a7955a653f35d9f82bb147bfebe0c5753922ae96cbc723c7cdc85cd15e04dffd
                              • Instruction ID: a0271f0dfebba61fb689677d942fa23ccac059e69cab0e56b3a6c6d64083804e
                              • Opcode Fuzzy Hash: a7955a653f35d9f82bb147bfebe0c5753922ae96cbc723c7cdc85cd15e04dffd
                              • Instruction Fuzzy Hash: 07115C72541209BBDF018FA4ED49BEE7BA9FF09304F048065FE05A2160C7719D64EB60
                              APIs
                                • Part of subcall function 00525A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00587896,?,?,00000000), ref: 00525A2C
                                • Part of subcall function 00525A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00587896,?,?,00000000,?,?), ref: 00525A50
                              • gethostbyname.WS2_32(?), ref: 00596399
                              • WSAGetLastError.WS2_32(00000000), ref: 005963A4
                              • _memmove.LIBCMT ref: 005963D1
                              • inet_ntoa.WS2_32(?), ref: 005963DC
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                              • String ID:
                              • API String ID: 1504782959-0
                              • Opcode ID: b643bd68511b84630603cd328fe66bb362a048e1a0b45b2d6d20511305e0ce15
                              • Instruction ID: 12f91b10292be85ca2e038b5019a31f3c2d5475677e48b0917181e08a676cf80
                              • Opcode Fuzzy Hash: b643bd68511b84630603cd328fe66bb362a048e1a0b45b2d6d20511305e0ce15
                              • Instruction Fuzzy Hash: AB11337150011AAFCF04FBA4ED8ACEEBFB8BF5A310B544465F505A72A1EB309E14DB61
                              APIs
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00578B61
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00578B73
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00578B89
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00578BA4
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 68f1bfae69414f4b70e60f3078e081c6bd0b6bbdb569623878f0c182ff57f159
                              • Instruction ID: 00fddc4d96079b09dd88b91d2b1f6f4cf86ab35094900682db82de0143753873
                              • Opcode Fuzzy Hash: 68f1bfae69414f4b70e60f3078e081c6bd0b6bbdb569623878f0c182ff57f159
                              • Instruction Fuzzy Hash: 15115E79940218FFDB10DF95CC88FADBB74FB48310F204095E904B7250DA716E10EB94
                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 0057D84D
                              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 0057D864
                              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 0057D879
                              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 0057D897
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Type$Register$FileLoadModuleNameUser
                              • String ID:
                              • API String ID: 1352324309-0
                              • Opcode ID: fba104b5c68dab906c1a82acabaaef22fc872993eac4ae202147fbb6e1ea7d43
                              • Instruction ID: b9978f937deff33e5ae93ef54ba63e21e9512dc4b593b00a3a8588dca53436dc
                              • Opcode Fuzzy Hash: fba104b5c68dab906c1a82acabaaef22fc872993eac4ae202147fbb6e1ea7d43
                              • Instruction Fuzzy Hash: 14115E75605304DBE7208F90EC08F92BBBCFF04B00F108969A55AD6450D7B0E549BBB2
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                              • String ID:
                              • API String ID: 3016257755-0
                              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction ID: 646c0ab97ab650b8c54a19cd4bc38bcc1e901b2cfe48907ba7d34a8d39bbe3d4
                              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction Fuzzy Hash: 99017E3244414EBBCF125E84EC29CED3FA2BB1C352B488416FE1859070D236D9B9AF81
                              APIs
                              • GetWindowRect.USER32(?,?), ref: 005AB2E4
                              • ScreenToClient.USER32(?,?), ref: 005AB2FC
                              • ScreenToClient.USER32(?,?), ref: 005AB320
                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 005AB33B
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ClientRectScreen$InvalidateWindow
                              • String ID:
                              • API String ID: 357397906-0
                              • Opcode ID: 678dc2a973adeff4e947340e1c1ee2b36b70f7936246c194fbea6f47c1c2dc5d
                              • Instruction ID: 68a638e85b72687275d81869e58455dc9e02f26dfd504342cfb6ba22dbdc14be
                              • Opcode Fuzzy Hash: 678dc2a973adeff4e947340e1c1ee2b36b70f7936246c194fbea6f47c1c2dc5d
                              • Instruction Fuzzy Hash: C21144B9D00209EFDB41CFA9C8849EEBBF9FF19311F108166E914E3220D735AA559F91
                              APIs
                              • RtlEnterCriticalSection.NTDLL(?), ref: 00586BE6
                                • Part of subcall function 005876C4: _memset.LIBCMT ref: 005876F9
                              • _memmove.LIBCMT ref: 00586C09
                              • _memset.LIBCMT ref: 00586C16
                              • RtlLeaveCriticalSection.NTDLL(?), ref: 00586C26
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CriticalSection_memset$EnterLeave_memmove
                              • String ID:
                              • API String ID: 48991266-0
                              • Opcode ID: 0e794be8c7f7a6f647afda17c4c282a366cb9694a27173165a731de4fe0eb6c0
                              • Instruction ID: 9179be65f1d9fe2bd9a167db7c46097f17c793fd08211199c441d33371997d55
                              • Opcode Fuzzy Hash: 0e794be8c7f7a6f647afda17c4c282a366cb9694a27173165a731de4fe0eb6c0
                              • Instruction Fuzzy Hash: 47F0543A100100ABCF416F95DC89A8ABF29FF85324F148061FE086E267D731E811DBB4
                              APIs
                              • GetSysColor.USER32(00000008), ref: 00522231
                              • SetTextColor.GDI32(?,000000FF), ref: 0052223B
                              • SetBkMode.GDI32(?,00000001), ref: 00522250
                              • GetStockObject.GDI32(00000005), ref: 00522258
                              • GetWindowDC.USER32(?,00000000), ref: 0055BE83
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 0055BE90
                              • GetPixel.GDI32(00000000,?,00000000), ref: 0055BEA9
                              • GetPixel.GDI32(00000000,00000000,?), ref: 0055BEC2
                              • GetPixel.GDI32(00000000,?,?), ref: 0055BEE2
                              • ReleaseDC.USER32(?,00000000), ref: 0055BEED
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                              • String ID:
                              • API String ID: 1946975507-0
                              • Opcode ID: eabb9e8133848065298f680ee1626fd11e38738e86cf3825e49222c00501b715
                              • Instruction ID: a56b9bb992fa385e778f023fe227779433ca0998e28c39be2e1e406101b887d9
                              • Opcode Fuzzy Hash: eabb9e8133848065298f680ee1626fd11e38738e86cf3825e49222c00501b715
                              • Instruction Fuzzy Hash: FCE0ED32504244EAEF215FA4FC4D7D83F15EB26336F148376FA69580E197724998EB22
                              APIs
                              • GetCurrentThread.KERNEL32 ref: 0057871B
                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,005782E6), ref: 00578722
                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,005782E6), ref: 0057872F
                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,005782E6), ref: 00578736
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CurrentOpenProcessThreadToken
                              • String ID:
                              • API String ID: 3974789173-0
                              • Opcode ID: 5df0a51ff3d96b198cef6295d90966f78714cc806f58e54775dcdcaf598127a3
                              • Instruction ID: 51382764622edce1d92af03845542d9242761b4b7cfd2b1efd3f824d8417bfb7
                              • Opcode Fuzzy Hash: 5df0a51ff3d96b198cef6295d90966f78714cc806f58e54775dcdcaf598127a3
                              • Instruction Fuzzy Hash: 60E086366512119BDB605FF06D0CB973BACFF62792F148828B24AC9040DA348449E750
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID:
                              • String ID: %[
                              • API String ID: 0-4034644999
                              • Opcode ID: 545b74240575d34b1f71914c35aabd227ee2330d1641905aff501717bd40472e
                              • Instruction ID: a2fe82e00314424c4fa2556d1fc7ffab50dd8899297d52d77d83db107d0f704e
                              • Opcode Fuzzy Hash: 545b74240575d34b1f71914c35aabd227ee2330d1641905aff501717bd40472e
                              • Instruction Fuzzy Hash: DDB1B07190012A9BCF14EF94E8959FEBFB8FF5A310F144426E942A71D1EB309E85C791
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: __itow_s
                              • String ID: xb^$xb^
                              • API String ID: 3653519197-777972382
                              • Opcode ID: a771ced108de321c96f778cc90cfd22c569adae54130b6245fe45e6b60bdd530
                              • Instruction ID: 11d5d50d7702b06fad397d746a2adf5da5fb2e95b5f9515ac9e36371a032ff2d
                              • Opcode Fuzzy Hash: a771ced108de321c96f778cc90cfd22c569adae54130b6245fe45e6b60bdd530
                              • Instruction Fuzzy Hash: F8B18E74A0020AAFEF14DF54D994DBABFB9FF99300F148459F9459B291EB30E940DBA0
                              APIs
                                • Part of subcall function 0053FC86: _wcscpy.LIBCMT ref: 0053FCA9
                                • Part of subcall function 00529837: __itow.LIBCMT ref: 00529862
                                • Part of subcall function 00529837: __swprintf.LIBCMT ref: 005298AC
                              • __wcsnicmp.LIBCMT ref: 0058B02D
                              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 0058B0F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                              • String ID: LPT
                              • API String ID: 3222508074-1350329615
                              • Opcode ID: 417408cffdab936c598498ada76e908f07a49134650e51f772a4ee2a4336008b
                              • Instruction ID: 6c54081a440143db6a424f30a5165a5fa15e8c9df811ec08ed2b21ce100c9a09
                              • Opcode Fuzzy Hash: 417408cffdab936c598498ada76e908f07a49134650e51f772a4ee2a4336008b
                              • Instruction Fuzzy Hash: 1C617F75A00219EFDB18EF94D899EAEBBB8FF49310F144059F916AB391D730AE40CB54
                              APIs
                              • Sleep.KERNEL32(00000000), ref: 00532968
                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00532981
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: GlobalMemorySleepStatus
                              • String ID: @
                              • API String ID: 2783356886-2766056989
                              • Opcode ID: 0f91fedfb630b32e6cb87094797e6e04bcccbe81b769b1ac9a8a9e451dc530f4
                              • Instruction ID: 1b2fb735f85bc3f71574b60755f0c9bca5a9a687c124b8d9f213bee822c4e1ca
                              • Opcode Fuzzy Hash: 0f91fedfb630b32e6cb87094797e6e04bcccbe81b769b1ac9a8a9e451dc530f4
                              • Instruction Fuzzy Hash: E15138724087559BD320EF50E88ABABBBE8FFD6354F42485DF2D8411A1DB308529CB56
                              APIs
                                • Part of subcall function 00524F0B: __fread_nolock.LIBCMT ref: 00524F29
                              • _wcscmp.LIBCMT ref: 00589824
                              • _wcscmp.LIBCMT ref: 00589837
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: _wcscmp$__fread_nolock
                              • String ID: FILE
                              • API String ID: 4029003684-3121273764
                              • Opcode ID: 37a76150a873182f8cd81a1fe3ee830bc83f4f8008e4219400f64010c0f2bb4d
                              • Instruction ID: d6582229a965fc29a448b6fcd9c9814600152e7562edb5d06586521f0679afd4
                              • Opcode Fuzzy Hash: 37a76150a873182f8cd81a1fe3ee830bc83f4f8008e4219400f64010c0f2bb4d
                              • Instruction Fuzzy Hash: C8418571A0021ABADF21AAA4DC49FFFBFB9EFC6714F014469B904B7181D67199048B61
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID: Dd^$Dd^
                              • API String ID: 1473721057-3975118295
                              • Opcode ID: c1b88d1cc4340cd3f2f13a28b7b4cf6a4f1605593f82332dc384f7ab0011287b
                              • Instruction ID: 04bf32fdf14ba15a6229a98e1f8b49a6109d764200c0be5d23759b903363f84d
                              • Opcode Fuzzy Hash: c1b88d1cc4340cd3f2f13a28b7b4cf6a4f1605593f82332dc384f7ab0011287b
                              • Instruction Fuzzy Hash: A451E3786043518FDB54CF19D584A1ABBF1BFAA394F54485CE9858B3A1D331EC85CF42
                              APIs
                              • _memset.LIBCMT ref: 0059259E
                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 005925D4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CrackInternet_memset
                              • String ID: |
                              • API String ID: 1413715105-2343686810
                              • Opcode ID: d57ceba50224e100463ba4c6f74343667c2aa77e1687e477e9ac6b21bffadee2
                              • Instruction ID: 23d8ecbed53f4f98d981461c1c3f40393c6f4d939b81d18ea8525a9aa28b3533
                              • Opcode Fuzzy Hash: d57ceba50224e100463ba4c6f74343667c2aa77e1687e477e9ac6b21bffadee2
                              • Instruction Fuzzy Hash: 71311A7180011AEBCF11EFA1DC89EEEBFB8FF49310F140059F915AA162EB315956DB60
                              APIs
                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 005A7B61
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 005A7B76
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: '
                              • API String ID: 3850602802-1997036262
                              • Opcode ID: 04eca3e9820ceb19c5282f2b1c025c5e3e3819be946f46dd4afcb87196786060
                              • Instruction ID: b2d858f3b0abc7a040a158ca4c9927de83e8e8b1cbeb197b21389be37d89f11f
                              • Opcode Fuzzy Hash: 04eca3e9820ceb19c5282f2b1c025c5e3e3819be946f46dd4afcb87196786060
                              • Instruction Fuzzy Hash: 5B410A74A0520EAFDB14CF64C981BDEBBB5FF09300F14016AE904AB351E770AA51DFA0
                              APIs
                              • DestroyWindow.USER32(?,?,?,?), ref: 005A6B17
                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 005A6B53
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$DestroyMove
                              • String ID: static
                              • API String ID: 2139405536-2160076837
                              • Opcode ID: 0cc2deb9c07a5533b74e05cbdbc6481725e7e749f442925bfb64179f3d5f9c64
                              • Instruction ID: 73f60e6d5efb29f0fc716755467c6ea5220e6df6b4b65588243418c8fae0feae
                              • Opcode Fuzzy Hash: 0cc2deb9c07a5533b74e05cbdbc6481725e7e749f442925bfb64179f3d5f9c64
                              • Instruction Fuzzy Hash: 7A318171100608AEDB109F74DC81BFF7BA9FF89760F148619F9A5D7190DA31AC91D760
                              APIs
                              • _memset.LIBCMT ref: 00582911
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 0058294C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: InfoItemMenu_memset
                              • String ID: 0
                              • API String ID: 2223754486-4108050209
                              • Opcode ID: e6d288c8b067e9bb5622123aa479ff64a9a8eff9c4706187f61e0a236e60fbb1
                              • Instruction ID: 8377994acb9a81d2cd6e8f311a28040bb2665de5765848050aa93abe85a4843a
                              • Opcode Fuzzy Hash: e6d288c8b067e9bb5622123aa479ff64a9a8eff9c4706187f61e0a236e60fbb1
                              • Instruction Fuzzy Hash: BA31C331A00305AFEB28EF58C985BAEBFB8FF45354F140029ED85B61A0E7709984CB51
                              APIs
                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 005A6761
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 005A676C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: Combobox
                              • API String ID: 3850602802-2096851135
                              • Opcode ID: 3ff3fb81d2a4f108a4ae1a5b722e63d7bb153f37dc05972e06b7c2cf7e5cdddb
                              • Instruction ID: cf8b002cc221a7634996ac4bc045fd27388bd1bc2abe279b1426c612dd2c7fbd
                              • Opcode Fuzzy Hash: 3ff3fb81d2a4f108a4ae1a5b722e63d7bb153f37dc05972e06b7c2cf7e5cdddb
                              • Instruction Fuzzy Hash: 6011B675210209AFEF159F54DC84EBF3F6AFB9A368F150125F91497290D631DC5187A0
                              APIs
                                • Part of subcall function 00521D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00521D73
                                • Part of subcall function 00521D35: GetStockObject.GDI32(00000011), ref: 00521D87
                                • Part of subcall function 00521D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00521D91
                              • GetWindowRect.USER32(00000000,?), ref: 005A6C71
                              • GetSysColor.USER32(00000012), ref: 005A6C8B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                              • String ID: static
                              • API String ID: 1983116058-2160076837
                              • Opcode ID: d30b584e3a65afa63314af376d6a3de70d977bf63bd432047743577835651b93
                              • Instruction ID: 0bb000d1fe70283bb1d68aca0950078c72ed7290c34f1055fceea41bbfe45f64
                              • Opcode Fuzzy Hash: d30b584e3a65afa63314af376d6a3de70d977bf63bd432047743577835651b93
                              • Instruction Fuzzy Hash: E721597651021AAFDF04DFB8CC45AEE7BA9FB19314F044628F995D3250E635E850DB60
                              APIs
                              • GetWindowTextLengthW.USER32(00000000), ref: 005A69A2
                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 005A69B1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: LengthMessageSendTextWindow
                              • String ID: edit
                              • API String ID: 2978978980-2167791130
                              • Opcode ID: 549ad49ff765463829330f947b706caa2ff205c3e103a749e83cdf223eb8ef64
                              • Instruction ID: b2e8d611109a72ea0cabc63d2fbb2fa1a04b4feefeafe158224bdc1cc5a866ec
                              • Opcode Fuzzy Hash: 549ad49ff765463829330f947b706caa2ff205c3e103a749e83cdf223eb8ef64
                              • Instruction Fuzzy Hash: B5116D71500108AFEB108E64DC44AEF3B69FB16374F544724F9A5971E0C731DC55A760
                              APIs
                              • _memset.LIBCMT ref: 00582A22
                              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00582A41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: InfoItemMenu_memset
                              • String ID: 0
                              • API String ID: 2223754486-4108050209
                              • Opcode ID: 530f539edfd35715952e410842a0f55d7bfa3600f47ab66623b2323aa90290d8
                              • Instruction ID: c9205b1e3fba5680264cbfd775eb404ece5d05316831b05b7be2081dd6a2e247
                              • Opcode Fuzzy Hash: 530f539edfd35715952e410842a0f55d7bfa3600f47ab66623b2323aa90290d8
                              • Instruction Fuzzy Hash: A511D036901114ABCB39EA98D984BAA7FA8BF45304F144029EC55FB290E7B0AD0AC791
                              APIs
                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0059222C
                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00592255
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Internet$OpenOption
                              • String ID: <local>
                              • API String ID: 942729171-4266983199
                              • Opcode ID: c44a35076fa49a58c5c8a38ebba888665ecb5d2bbb31fec79c74fa7114ed6031
                              • Instruction ID: 22a3e36d780a0cfb35edea1f0b00c72434468ab0d1b52498bfccd8c21c63b75d
                              • Opcode Fuzzy Hash: c44a35076fa49a58c5c8a38ebba888665ecb5d2bbb31fec79c74fa7114ed6031
                              • Instruction Fuzzy Hash: 3A11CE74541225BADF299F518C88EFBFFA8FF16751F10862AF91586100D3706994EAF0
                              APIs
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                                • Part of subcall function 0057AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0057AABC
                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00578E73
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: ed5db7c92904d40af8cfe2bedcce1d0f76a602e43dd173f7f8f8b6bf84e71027
                              • Instruction ID: 4ab4b24202cd0bde69c7eb85933c48ee2ed24e63dad6c75c725a374a7c60e91e
                              • Opcode Fuzzy Hash: ed5db7c92904d40af8cfe2bedcce1d0f76a602e43dd173f7f8f8b6bf84e71027
                              • Instruction Fuzzy Hash: F501F57164122AAB8B14EBA4DC4DCFE7B6CBF86320B044A1AF835572D1EF315808E750
                              APIs
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                                • Part of subcall function 0057AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0057AABC
                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00578D6B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 72a2f476194e4103fba720915a4638da7261891266d86b58383f88e7ba28493c
                              • Instruction ID: ca2d2a59272460bfda72b294da71c62e3fad91614ff28266ab36206a46f4d21f
                              • Opcode Fuzzy Hash: 72a2f476194e4103fba720915a4638da7261891266d86b58383f88e7ba28493c
                              • Instruction Fuzzy Hash: 9901D871641119ABCB24EBA0D95AEFE7FA8BF56340F1040167405632D1EE215E08E3B1
                              APIs
                                • Part of subcall function 00527DE1: _memmove.LIBCMT ref: 00527E22
                                • Part of subcall function 0057AA99: GetClassNameW.USER32(?,?,000000FF), ref: 0057AABC
                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00578DEE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 54acd7c41167cbaeaadc957ae80e25385c855240eeea1fb18927f9cc3329b35d
                              • Instruction ID: c43416d7d72881b6088ac91238ba2867ca2c4d20a6b4b2513f62d314797335d8
                              • Opcode Fuzzy Hash: 54acd7c41167cbaeaadc957ae80e25385c855240eeea1fb18927f9cc3329b35d
                              • Instruction Fuzzy Hash: 2D01FC7164111967CB25E6A4E94DEFE7F5CBF56300F144016B805632D1DD214E08F271
                              APIs
                              • VariantInit.OLEAUT32(?), ref: 0057C534
                                • Part of subcall function 0057C816: _memmove.LIBCMT ref: 0057C860
                                • Part of subcall function 0057C816: VariantInit.OLEAUT32(00000000), ref: 0057C882
                                • Part of subcall function 0057C816: VariantCopy.OLEAUT32(00000000,?), ref: 0057C88C
                              • VariantClear.OLEAUT32(?), ref: 0057C556
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Variant$Init$ClearCopy_memmove
                              • String ID: d}]
                              • API String ID: 2932060187-1070895132
                              • Opcode ID: ec47de1e3c882874fa958eeb720e3a974b341c1f70dd8af95b0756d2c2ca8e91
                              • Instruction ID: 181a23f8e1ba70d884bef23a5c3f97004936487e5064d0a2997fe72b5103978a
                              • Opcode Fuzzy Hash: ec47de1e3c882874fa958eeb720e3a974b341c1f70dd8af95b0756d2c2ca8e91
                              • Instruction Fuzzy Hash: 1A1112719007099FC720DF99D88489AFBF8FF18310B50856FE58AD7651E771AA48CF90
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: ClassName_wcscmp
                              • String ID: #32770
                              • API String ID: 2292705959-463685578
                              • Opcode ID: 28275b88761ddf3f82d609d5efaeb5f11ad9d968c256a58cd0b7f4c893e548ae
                              • Instruction ID: b94bb1ee462a761ac2b64ec18c7f5839f696ebbec3f9ee15946bd9ea71f7e6d1
                              • Opcode Fuzzy Hash: 28275b88761ddf3f82d609d5efaeb5f11ad9d968c256a58cd0b7f4c893e548ae
                              • Instruction Fuzzy Hash: 83E0D13260032927D7209799AC49FF7FBACFB65B71F000157FD04D7151D5609A4587D0
                              APIs
                                • Part of subcall function 0055B314: _memset.LIBCMT ref: 0055B321
                                • Part of subcall function 00540940: InitializeCriticalSectionAndSpinCount.KERNEL32(005E4158,00000000,005E4144,0055B2F0,?,?,?,0052100A), ref: 00540945
                              • IsDebuggerPresent.KERNEL32(?,?,?,0052100A), ref: 0055B2F4
                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0052100A), ref: 0055B303
                              Strings
                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0055B2FE
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                              • API String ID: 3158253471-631824599
                              • Opcode ID: 455788b0b0e9ee66ae7a2344661c6b27c7dfcae51187c40a5820e126ff1b27ee
                              • Instruction ID: acfab3f0be059ecae2dc0a78b0ecddfd696f023999e3ef33e6d2250ae822f579
                              • Opcode Fuzzy Hash: 455788b0b0e9ee66ae7a2344661c6b27c7dfcae51187c40a5820e126ff1b27ee
                              • Instruction Fuzzy Hash: CBE06D742007118FE7209F68E8087427EE8BF10305F018E6EE896DB281E7B4E40CDBA1
                              APIs
                              • GetSystemDirectoryW.KERNEL32(?), ref: 00561775
                                • Part of subcall function 0059BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,0056195E,?), ref: 0059BFFE
                                • Part of subcall function 0059BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0059C010
                              • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 0056196D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: Library$AddressDirectoryFreeLoadProcSystem
                              • String ID: WIN_XPe
                              • API String ID: 582185067-3257408948
                              • Opcode ID: 1b3fd526c6af37c3fa9e866e03084f9bf765525e558c06fb9342e7a1d3c8723c
                              • Instruction ID: 671e775bf7f256673fd4b7cf1b62bd9abf2b94cdb073620e8dfe77b92d883629
                              • Opcode Fuzzy Hash: 1b3fd526c6af37c3fa9e866e03084f9bf765525e558c06fb9342e7a1d3c8723c
                              • Instruction Fuzzy Hash: 72F0A571800109DBDB15DB95D988AECBEB8FB18301F580495E102A7091D7715E88EF64
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 005A596E
                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 005A5981
                                • Part of subcall function 00585244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 005852BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: dc117d586c517c3ec82da875c9428212dd2fe6389980e21e0b9ab4cca8820653
                              • Instruction ID: c57b61279ee1657502073fea42796b95bc736d6cb3efe31e42f4f14f8c882b26
                              • Opcode Fuzzy Hash: dc117d586c517c3ec82da875c9428212dd2fe6389980e21e0b9ab4cca8820653
                              • Instruction Fuzzy Hash: 90D0C935784311B7E674BBB0AC4FFA67A54BB55B50F000826B64AAA1D0D9E0A804C754
                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 005A59AE
                              • PostMessageW.USER32(00000000), ref: 005A59B5
                                • Part of subcall function 00585244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 005852BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.1699069497.0000000000521000.00000040.00000001.01000000.00000003.sdmp, Offset: 00520000, based on PE: true
                              • Associated: 00000000.00000002.1699035980.0000000000520000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005D4000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005DE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.00000000005FE000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699069497.0000000000641000.00000040.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699524593.0000000000647000.00000080.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.1699572052.0000000000648000.00000004.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_520000_LMxd0gpIxe.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: ea2a5bd12355bdd31932298cc4825547a73c05cb95e9624123be0d27fe09c649
                              • Instruction ID: c033d8215dd9a9cc3e0afd4ebe8b8e8c3acc31deaf90deb9295b43e0ebe41a3a
                              • Opcode Fuzzy Hash: ea2a5bd12355bdd31932298cc4825547a73c05cb95e9624123be0d27fe09c649
                              • Instruction Fuzzy Hash: 94D0C9357813117BE674BBB0AC4FF967A54BB55B50F000826B646AA1D0D9E0A804C754