Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tN8GsMV1le.exe

Overview

General Information

Sample name:tN8GsMV1le.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:0ed8ca46015ab7478fea92df5e02cee1939cc83f3ab308dd50d973fbce00aa36
Analysis ID:1590073
MD5:80d1696d1faeb3a13686b7ad4620e8af
SHA1:4181929b796b7fd1583aa3e2add32d89f1d753c3
SHA256:0ed8ca46015ab7478fea92df5e02cee1939cc83f3ab308dd50d973fbce00aa36
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Drops VBS files to the startup folder
Found API chain indicative of sandbox detection
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
PE file contains executable resources (Code or Archives)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • tN8GsMV1le.exe (PID: 7424 cmdline: "C:\Users\user\Desktop\tN8GsMV1le.exe" MD5: 80D1696D1FAEB3A13686B7AD4620E8AF)
    • ageless.exe (PID: 7444 cmdline: "C:\Users\user\Desktop\tN8GsMV1le.exe" MD5: 80D1696D1FAEB3A13686B7AD4620E8AF)
      • RegSvcs.exe (PID: 7472 cmdline: "C:\Users\user\Desktop\tN8GsMV1le.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 7624 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • ageless.exe (PID: 7676 cmdline: "C:\Users\user\AppData\Local\flexuosely\ageless.exe" MD5: 80D1696D1FAEB3A13686B7AD4620E8AF)
      • RegSvcs.exe (PID: 7704 cmdline: "C:\Users\user\AppData\Local\flexuosely\ageless.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
{"EXfil Mode": "SMTP", "From": "contabilidad@daipro.com.mx", "Password": "DAIpro123**", "Server": "daipro.com.mx", "To": "saleseuropower2@yandex.com", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2988302345.00000000026B5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
      00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0xf1a7:$a1: get_encryptedPassword
          • 0xf4cf:$a2: get_encryptedUsername
          • 0xef42:$a3: get_timePasswordChanged
          • 0xf063:$a4: get_passwordField
          • 0xf1bd:$a5: set_encryptedPassword
          • 0x10b19:$a7: get_logins
          • 0x107ca:$a8: GetOutlookPasswords
          • 0x105bc:$a9: StartKeylogger
          • 0x10a69:$a10: KeyLoggerEventArgs
          • 0x10619:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 20 entries
          SourceRuleDescriptionAuthorStrings
          1.2.ageless.exe.3af0000.1.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            1.2.ageless.exe.3af0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              1.2.ageless.exe.3af0000.1.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                1.2.ageless.exe.3af0000.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xd3a7:$a1: get_encryptedPassword
                • 0xd6cf:$a2: get_encryptedUsername
                • 0xd142:$a3: get_timePasswordChanged
                • 0xd263:$a4: get_passwordField
                • 0xd3bd:$a5: set_encryptedPassword
                • 0xed19:$a7: get_logins
                • 0xe9ca:$a8: GetOutlookPasswords
                • 0xe7bc:$a9: StartKeylogger
                • 0xec69:$a10: KeyLoggerEventArgs
                • 0xe819:$a11: KeyLoggerEventArgsEventHandler
                1.2.ageless.exe.3af0000.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x12365:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x11863:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x11b71:$a4: \Orbitum\User Data\Default\Login Data
                • 0x12969:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 16 entries

                System Summary

                barindex
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs" , ProcessId: 7624, ProcessName: wscript.exe
                Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs" , ProcessId: 7624, ProcessName: wscript.exe

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\flexuosely\ageless.exe, ProcessId: 7444, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-13T15:08:34.055922+010028032742Potentially Bad Traffic192.168.2.449730132.226.8.16980TCP
                2025-01-13T15:08:46.649609+010028032742Potentially Bad Traffic192.168.2.449732132.226.8.16980TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 4.2.ageless.exe.41b0000.1.raw.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "contabilidad@daipro.com.mx", "Password": "DAIpro123**", "Server": "daipro.com.mx", "To": "saleseuropower2@yandex.com", "Port": 587}
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeReversingLabs: Detection: 47%
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeVirustotal: Detection: 45%Perma Link
                Source: tN8GsMV1le.exeReversingLabs: Detection: 47%
                Source: tN8GsMV1le.exeVirustotal: Detection: 45%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeJoe Sandbox ML: detected
                Source: tN8GsMV1le.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: tN8GsMV1le.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49731 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49734 version: TLS 1.0
                Source: Binary string: wntdll.pdbUGP source: ageless.exe, 00000001.00000003.1756007348.0000000003F70000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000001.00000003.1754537545.0000000004110000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000004.00000003.1881177175.00000000041D0000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000004.00000003.1884616502.0000000004390000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: ageless.exe, 00000001.00000003.1756007348.0000000003F70000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000001.00000003.1754537545.0000000004110000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000004.00000003.1881177175.00000000041D0000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000004.00000003.1884616502.0000000004390000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_008368EE FindFirstFileW,FindClose,0_2_008368EE
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0083698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0083698F
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0082D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0082D076
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0082D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0082D3A9
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00839642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00839642
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0083979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0083979D
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0082DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0082DBBE
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00839B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00839B2B
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00835C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00835C97
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002C68EE FindFirstFileW,FindClose,1_2_002C68EE
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002C698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_002C698F
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002BD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_002BD076
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002BD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_002BD3A9
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002C9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_002C9642
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002C979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_002C979D
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002C9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_002C9B2B
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002BDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_002BDBBE
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002C5C97 FindFirstFileW,FindNextFileW,FindClose,1_2_002C5C97
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002C68EE FindFirstFileW,FindClose,4_2_002C68EE
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002C698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,4_2_002C698F
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002BD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,4_2_002BD076
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002BD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,4_2_002BD3A9
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002C9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_002C9642
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002C979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_002C979D
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002C9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,4_2_002C9B2B
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002BDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,4_2_002BDBBE
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002C5C97 FindFirstFileW,FindNextFileW,FindClose,4_2_002C5C97
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02469731h2_2_02469480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02469E5Ah2_2_02469A40
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02469E5Ah2_2_02469A30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 02469E5Ah2_2_02469D87
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49730 -> 132.226.8.169:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49732 -> 132.226.8.169:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49731 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.4:49734 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0083CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0083CE44
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: RegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: RegSvcs.exe, 00000002.00000002.2988302345.00000000025FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F4E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegSvcs.exe, 00000002.00000002.2988302345.0000000002591000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002EE1000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: RegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: ageless.exe, 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2986759550.0000000000413000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: RegSvcs.exe, 00000002.00000002.2988302345.000000000262D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: RegSvcs.exe, 00000002.00000002.2988302345.000000000262D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F7D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: RegSvcs.exe, 00000002.00000002.2988302345.0000000002591000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: ageless.exe, 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2986759550.0000000000413000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: RegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: ageless.exe, 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, ageless.exe, 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2986759550.0000000000413000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: RegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                Source: RegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
                Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0083EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0083EAFF
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0083ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0083ED6A
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002CED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_002CED6A
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002CED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,4_2_002CED6A
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0083EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0083EAFF
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0082AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0082AA57
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00859576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00859576
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E9576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_002E9576
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E9576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,4_2_002E9576

                System Summary

                barindex
                Source: 1.2.ageless.exe.3af0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.ageless.exe.3af0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 4.2.ageless.exe.41b0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 4.2.ageless.exe.41b0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 4.2.ageless.exe.41b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 4.2.ageless.exe.41b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.ageless.exe.3af0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.ageless.exe.3af0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: Process Memory Space: ageless.exe PID: 7444, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegSvcs.exe PID: 7472, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: ageless.exe PID: 7676, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: tN8GsMV1le.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: tN8GsMV1le.exe, 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_46b12145-2
                Source: tN8GsMV1le.exe, 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_190b0e5f-2
                Source: ageless.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: ageless.exe, 00000001.00000002.1757620819.0000000000312000.00000040.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d208b053-9
                Source: ageless.exe, 00000001.00000002.1757620819.0000000000312000.00000040.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_d856912b-f
                Source: ageless.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: ageless.exe, 00000004.00000002.1886925480.0000000000312000.00000040.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_0e7629bf-d
                Source: ageless.exe, 00000004.00000002.1886925480.0000000000312000.00000040.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_004f72bb-d
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007C3170 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,0_2_007C3170
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0085A2D7 NtdllDialogWndProc_W,0_2_0085A2D7
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_008587B2 NtdllDialogWndProc_W,CallWindowProcW,0_2_008587B2
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00858AAA NtdllDialogWndProc_W,0_2_00858AAA
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007D8BA4 NtdllDialogWndProc_W,0_2_007D8BA4
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00858FC9 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,0_2_00858FC9
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_008590A1 SendMessageW,NtdllDialogWndProc_W,0_2_008590A1
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007D9052 NtdllDialogWndProc_W,0_2_007D9052
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007D90A7 NtdllDialogWndProc_W,0_2_007D90A7
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0085911E DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,0_2_0085911E
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00859380 NtdllDialogWndProc_W,0_2_00859380
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_008593CB NtdllDialogWndProc_W,0_2_008593CB
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00859400 ClientToScreen,NtdllDialogWndProc_W,0_2_00859400
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0085953A GetWindowLongW,NtdllDialogWndProc_W,0_2_0085953A
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00859576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00859576
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007D97C0 GetParent,NtdllDialogWndProc_W,0_2_007D97C0
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007D997D NtdllDialogWndProc_W,GetSysColor,SetBkColor,745EC8D0,NtdllDialogWndProc_W,0_2_007D997D
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00859EF3 GetClientRect,GetCursorPos,ScreenToClient,NtdllDialogWndProc_W,0_2_00859EF3
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00859E74 NtdllDialogWndProc_W,0_2_00859E74
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00859F86 GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W,0_2_00859F86
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_00253170 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,1_2_00253170
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002EA2D7 NtdllDialogWndProc_W,1_2_002EA2D7
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E87B2 NtdllDialogWndProc_W,CallWindowProcW,1_2_002E87B2
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E8AAA NtdllDialogWndProc_W,1_2_002E8AAA
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_00268BA4 NtdllDialogWndProc_W,1_2_00268BA4
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E8FC9 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,1_2_002E8FC9
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_00269052 NtdllDialogWndProc_W,1_2_00269052
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002690A7 NtdllDialogWndProc_W,1_2_002690A7
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E90A1 SendMessageW,NtdllDialogWndProc_W,1_2_002E90A1
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E911E DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,1_2_002E911E
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E9380 NtdllDialogWndProc_W,1_2_002E9380
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E93CB NtdllDialogWndProc_W,1_2_002E93CB
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E9400 ClientToScreen,NtdllDialogWndProc_W,1_2_002E9400
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E953A GetWindowLongW,NtdllDialogWndProc_W,1_2_002E953A
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E9576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_002E9576
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002697C0 GetParent,NtdllDialogWndProc_W,1_2_002697C0
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0026997D NtdllDialogWndProc_W,GetSysColor,SetBkColor,745EC8D0,NtdllDialogWndProc_W,1_2_0026997D
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E9E74 NtdllDialogWndProc_W,1_2_002E9E74
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E9EF3 GetClientRect,GetCursorPos,ScreenToClient,NtdllDialogWndProc_W,1_2_002E9EF3
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E9F86 GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W,1_2_002E9F86
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_00253170 NtdllDefWindowProc_W,KillTimer,SetTimer,RegisterClipboardFormatW,CreatePopupMenu,PostQuitMessage,SetFocus,MoveWindow,4_2_00253170
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002EA2D7 NtdllDialogWndProc_W,4_2_002EA2D7
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E87B2 NtdllDialogWndProc_W,CallWindowProcW,4_2_002E87B2
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E8AAA NtdllDialogWndProc_W,4_2_002E8AAA
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_00268BA4 NtdllDialogWndProc_W,4_2_00268BA4
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E8FC9 GetCursorPos,TrackPopupMenuEx,GetCursorPos,NtdllDialogWndProc_W,4_2_002E8FC9
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_00269052 NtdllDialogWndProc_W,4_2_00269052
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002690A7 NtdllDialogWndProc_W,4_2_002690A7
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E90A1 SendMessageW,NtdllDialogWndProc_W,4_2_002E90A1
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E911E DragQueryPoint,SendMessageW,DragQueryFileW,DragQueryFileW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,DragFinish,NtdllDialogWndProc_W,4_2_002E911E
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E9380 NtdllDialogWndProc_W,4_2_002E9380
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E93CB NtdllDialogWndProc_W,4_2_002E93CB
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E9400 ClientToScreen,NtdllDialogWndProc_W,4_2_002E9400
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E953A GetWindowLongW,NtdllDialogWndProc_W,4_2_002E953A
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E9576 NtdllDialogWndProc_W,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SetCapture,ClientToScreen,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,4_2_002E9576
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002697C0 GetParent,NtdllDialogWndProc_W,4_2_002697C0
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_0026997D NtdllDialogWndProc_W,GetSysColor,SetBkColor,745EC8D0,NtdllDialogWndProc_W,4_2_0026997D
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E9E74 NtdllDialogWndProc_W,4_2_002E9E74
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E9EF3 GetClientRect,GetCursorPos,ScreenToClient,NtdllDialogWndProc_W,4_2_002E9EF3
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E9F86 GetSystemMetrics,GetSystemMetrics,MoveWindow,SendMessageW,SendMessageW,ShowWindow,InvalidateRect,NtdllDialogWndProc_W,4_2_002E9F86
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0082D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0082D5EB
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00821201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,74755590,CreateProcessAsUserW,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,0_2_00821201
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0082E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0082E8F6
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002BE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_002BE8F6
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002BE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,4_2_002BE8F6
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007C80600_2_007C8060
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_008320460_2_00832046
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_008282980_2_00828298
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007FE4FF0_2_007FE4FF
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007F676B0_2_007F676B
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_008548730_2_00854873
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007CCAF00_2_007CCAF0
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007ECAA00_2_007ECAA0
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007DCC390_2_007DCC39
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007F6DD90_2_007F6DD9
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007DB1190_2_007DB119
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007C91C00_2_007C91C0
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007E13940_2_007E1394
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007E17060_2_007E1706
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007E781B0_2_007E781B
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007D997D0_2_007D997D
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007C79200_2_007C7920
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007E19B00_2_007E19B0
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007E7A4A0_2_007E7A4A
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007E1C770_2_007E1C77
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007E7CA70_2_007E7CA7
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007F9EEE0_2_007F9EEE
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0084BE440_2_0084BE44
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007E1F320_2_007E1F32
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_017D0C500_2_017D0C50
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002580601_2_00258060
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002C20461_2_002C2046
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002B82981_2_002B8298
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0028E4FF1_2_0028E4FF
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0028676B1_2_0028676B
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E48731_2_002E4873
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0027CAA01_2_0027CAA0
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0025CAF01_2_0025CAF0
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0026CC391_2_0026CC39
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_00286DD91_2_00286DD9
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0026D0641_2_0026D064
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0026B1191_2_0026B119
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002591C01_2_002591C0
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002713941_2_00271394
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002717061_2_00271706
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0027781B1_2_0027781B
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002579201_2_00257920
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0026997D1_2_0026997D
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002719B01_2_002719B0
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_00277A4A1_2_00277A4A
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_00271C771_2_00271C77
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_00277CA71_2_00277CA7
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002DBE441_2_002DBE44
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_00289EEE1_2_00289EEE
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_00271F321_2_00271F32
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0025BF401_2_0025BF40
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0176EB081_2_0176EB08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0246C5302_2_0246C530
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02462DD12_2_02462DD1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_024694802_2_02469480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_024619B82_2_024619B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0246C5212_2_0246C521
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0246946F2_2_0246946F
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002580604_2_00258060
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002C20464_2_002C2046
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002B82984_2_002B8298
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_0028E4FF4_2_0028E4FF
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_0028676B4_2_0028676B
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E48734_2_002E4873
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_0027CAA04_2_0027CAA0
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_0025CAF04_2_0025CAF0
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_0026CC394_2_0026CC39
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_00286DD94_2_00286DD9
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_0026D0644_2_0026D064
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_0026B1194_2_0026B119
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002591C04_2_002591C0
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002713944_2_00271394
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002717064_2_00271706
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_0027781B4_2_0027781B
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002579204_2_00257920
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_0026997D4_2_0026997D
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002719B04_2_002719B0
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_00277A4A4_2_00277A4A
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_00271C774_2_00271C77
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_00277CA74_2_00277CA7
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002DBE444_2_002DBE44
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_00289EEE4_2_00289EEE
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_00271F324_2_00271F32
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_0025BF404_2_0025BF40
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_01A53C484_2_01A53C48
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: String function: 007DF9F2 appears 31 times
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: String function: 007E0A30 appears 46 times
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: String function: 00274963 appears 54 times
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: String function: 00270A30 appears 92 times
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: String function: 00259CB3 appears 60 times
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: String function: 00278E0B appears 36 times
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: String function: 0025988F appears 34 times
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: String function: 00274A28 appears 40 times
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: String function: 0025600E appears 34 times
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: String function: 002BDF27 appears 32 times
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: String function: 0026F9F2 appears 62 times
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: String function: 00282FA6 appears 48 times
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: String function: 00291F50 appears 52 times
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: String function: 0025CFA0 appears 44 times
                Source: tN8GsMV1le.exeStatic PE information: Resource name: RT_STRING type: COM executable for DOS
                Source: ageless.exe.0.drStatic PE information: Resource name: RT_STRING type: COM executable for DOS
                Source: tN8GsMV1le.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 1.2.ageless.exe.3af0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.ageless.exe.3af0000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 5.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.ageless.exe.41b0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 4.2.ageless.exe.41b0000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.ageless.exe.41b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 4.2.ageless.exe.41b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.ageless.exe.3af0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.ageless.exe.3af0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: Process Memory Space: ageless.exe PID: 7444, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegSvcs.exe PID: 7472, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: ageless.exe PID: 7676, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@10/3@2/2
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_008337B5 GetLastError,FormatMessageW,0_2_008337B5
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_008210BF AdjustTokenPrivileges,CloseHandle,0_2_008210BF
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_008216C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_008216C3
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002B10BF AdjustTokenPrivileges,CloseHandle,1_2_002B10BF
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002B16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_002B16C3
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002B10BF AdjustTokenPrivileges,CloseHandle,4_2_002B10BF
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002B16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,4_2_002B16C3
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_008351CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_008351CD
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0084A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0084A67C
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0083648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0083648E
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007C42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_007C42A2
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeFile created: C:\Users\user\AppData\Local\flexuoselyJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeFile created: C:\Users\user\AppData\Local\Temp\HalithersesJump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs"
                Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegSvcs.exe, 00000002.00000002.2988302345.0000000002670000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2988302345.0000000002680000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2988302345.000000000268E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002FD0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002FDE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002FC0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: tN8GsMV1le.exeReversingLabs: Detection: 47%
                Source: tN8GsMV1le.exeVirustotal: Detection: 45%
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeFile read: C:\Users\user\Desktop\tN8GsMV1le.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\tN8GsMV1le.exe "C:\Users\user\Desktop\tN8GsMV1le.exe"
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeProcess created: C:\Users\user\AppData\Local\flexuosely\ageless.exe "C:\Users\user\Desktop\tN8GsMV1le.exe"
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\tN8GsMV1le.exe"
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\flexuosely\ageless.exe "C:\Users\user\AppData\Local\flexuosely\ageless.exe"
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\flexuosely\ageless.exe"
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeProcess created: C:\Users\user\AppData\Local\flexuosely\ageless.exe "C:\Users\user\Desktop\tN8GsMV1le.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\tN8GsMV1le.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\flexuosely\ageless.exe "C:\Users\user\AppData\Local\flexuosely\ageless.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\flexuosely\ageless.exe" Jump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Binary string: wntdll.pdbUGP source: ageless.exe, 00000001.00000003.1756007348.0000000003F70000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000001.00000003.1754537545.0000000004110000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000004.00000003.1881177175.00000000041D0000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000004.00000003.1884616502.0000000004390000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: ageless.exe, 00000001.00000003.1756007348.0000000003F70000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000001.00000003.1754537545.0000000004110000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000004.00000003.1881177175.00000000041D0000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000004.00000003.1884616502.0000000004390000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007C42DE
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007E0A76 push ecx; ret 0_2_007E0A89
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_00270A76 push ecx; ret 1_2_00270A89
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_00270A76 push ecx; ret 4_2_00270A89
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: initial sampleStatic PE information: section name: UPX0
                Source: initial sampleStatic PE information: section name: UPX1
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeFile created: C:\Users\user\AppData\Local\flexuosely\ageless.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbsJump to dropped file
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbsJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbsJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (92).png
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007DF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007DF98E
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00851C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00851C41
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0026F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_0026F98E
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002E1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_002E1C41
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_0026F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,4_2_0026F98E
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002E1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,4_2_002E1C41
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleep
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95287
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeAPI/Special instruction interceptor: Address: 176E72C
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeAPI/Special instruction interceptor: Address: 1A5386C
                Source: ageless.exe, 00000004.00000002.1888446015.000000000196A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE]
                Source: tN8GsMV1le.exe, 00000000.00000002.1741392845.000000000170F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE
                Source: ageless.exe, 00000001.00000002.1758697335.000000000163E000.00000004.00000020.00020000.00000000.sdmp, ageless.exe, 00000001.00000003.1757189639.000000000163E000.00000004.00000020.00020000.00000000.sdmp, ageless.exe, 00000001.00000003.1740975873.000000000163E000.00000004.00000020.00020000.00000000.sdmp, ageless.exe, 00000001.00000003.1739906124.000000000163E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE8D
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeAPI coverage: 3.4 %
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeAPI coverage: 3.8 %
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeAPI coverage: 3.5 %
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_008368EE FindFirstFileW,FindClose,0_2_008368EE
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0083698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0083698F
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0082D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0082D076
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0082D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0082D3A9
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00839642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00839642
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0083979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0083979D
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0082DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0082DBBE
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00839B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00839B2B
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00835C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00835C97
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002C68EE FindFirstFileW,FindClose,1_2_002C68EE
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002C698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_002C698F
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002BD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_002BD076
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002BD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_002BD3A9
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002C9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_002C9642
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002C979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_002C979D
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002C9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_002C9B2B
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002BDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_002BDBBE
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002C5C97 FindFirstFileW,FindNextFileW,FindClose,1_2_002C5C97
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002C68EE FindFirstFileW,FindClose,4_2_002C68EE
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002C698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,4_2_002C698F
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002BD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,4_2_002BD076
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002BD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,4_2_002BD3A9
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002C9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_002C9642
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002C979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,4_2_002C979D
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002C9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,4_2_002C9B2B
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002BDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,4_2_002BDBBE
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002C5C97 FindFirstFileW,FindNextFileW,FindClose,4_2_002C5C97
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007C42DE
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Jump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Jump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Jump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Jump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\Jump to behavior
                Source: C:\Windows\System32\wscript.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Jump to behavior
                Source: wscript.exe, 00000003.00000002.1872313759.00000227B2F23000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}\
                Source: RegSvcs.exe, 00000002.00000002.2987340666.0000000000907000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllV
                Source: RegSvcs.exe, 00000005.00000002.2987316666.0000000001217000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll-
                Source: wscript.exe, 00000003.00000002.1872313759.00000227B2F23000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeAPI call chain: ExitProcess graph end nodegraph_0-96800
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0083EAA2 BlockInput,0_2_0083EAA2
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007F2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007F2622
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007C42DE
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007E4CE8 mov eax, dword ptr fs:[00000030h]0_2_007E4CE8
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_017D0B40 mov eax, dword ptr fs:[00000030h]0_2_017D0B40
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_017D0AE0 mov eax, dword ptr fs:[00000030h]0_2_017D0AE0
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_017CF470 mov eax, dword ptr fs:[00000030h]0_2_017CF470
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_00274CE8 mov eax, dword ptr fs:[00000030h]1_2_00274CE8
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0176E9F8 mov eax, dword ptr fs:[00000030h]1_2_0176E9F8
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0176E998 mov eax, dword ptr fs:[00000030h]1_2_0176E998
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0176D328 mov eax, dword ptr fs:[00000030h]1_2_0176D328
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_00274CE8 mov eax, dword ptr fs:[00000030h]4_2_00274CE8
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_01A52468 mov eax, dword ptr fs:[00000030h]4_2_01A52468
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_01A53B38 mov eax, dword ptr fs:[00000030h]4_2_01A53B38
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_01A53AD8 mov eax, dword ptr fs:[00000030h]4_2_01A53AD8
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00820B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00820B62
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007F2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007F2622
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007E083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_007E083F
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007E09D5 SetUnhandledExceptionFilter,0_2_007E09D5
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007E0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_007E0C21
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_00282622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00282622
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_0027083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0027083F
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002709D5 SetUnhandledExceptionFilter,1_2_002709D5
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_00270C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00270C21
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_00282622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00282622
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_0027083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0027083F
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002709D5 SetUnhandledExceptionFilter,4_2_002709D5
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_00270C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00270C21
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 432008Jump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: C25008Jump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00821201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,74755590,CreateProcessAsUserW,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,0_2_00821201
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00802BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00802BA5
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0082B226 SendInput,keybd_event,0_2_0082B226
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_008422DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_008422DA
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\tN8GsMV1le.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\flexuosely\ageless.exe "C:\Users\user\AppData\Local\flexuosely\ageless.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\flexuosely\ageless.exe" Jump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00820B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,RtlAllocateHeap,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00820B62
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00821663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00821663
                Source: tN8GsMV1le.exe, 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmp, ageless.exe, 00000001.00000002.1757620819.0000000000312000.00000040.00000001.01000000.00000004.sdmp, ageless.exe, 00000004.00000002.1886925480.0000000000312000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: ageless.exeBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007E0698 cpuid 0_2_007E0698
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00838195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00838195
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_0081D27A GetUserNameW,0_2_0081D27A
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007FBB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_007FBB6F
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_007C42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007C42DE
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 1.2.ageless.exe.3af0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.ageless.exe.41b0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.ageless.exe.41b0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ageless.exe.3af0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 7444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7472, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 7676, type: MEMORYSTR
                Source: Yara matchFile source: 1.2.ageless.exe.3af0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.ageless.exe.41b0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.ageless.exe.41b0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ageless.exe.3af0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 7444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 7676, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7704, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: ageless.exeBinary or memory string: WIN_81
                Source: ageless.exeBinary or memory string: WIN_XP
                Source: ageless.exe, 00000004.00000002.1886925480.0000000000312000.00000040.00000001.01000000.00000004.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                Source: ageless.exeBinary or memory string: WIN_XPe
                Source: ageless.exeBinary or memory string: WIN_VISTA
                Source: ageless.exeBinary or memory string: WIN_7
                Source: ageless.exeBinary or memory string: WIN_8
                Source: Yara matchFile source: 1.2.ageless.exe.3af0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.ageless.exe.41b0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.ageless.exe.41b0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ageless.exe.3af0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2988302345.00000000026B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2988584382.0000000003005000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 7444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7472, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 7676, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7704, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 1.2.ageless.exe.3af0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.ageless.exe.41b0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.ageless.exe.41b0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ageless.exe.3af0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 7444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7472, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 7676, type: MEMORYSTR
                Source: Yara matchFile source: 1.2.ageless.exe.3af0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.ageless.exe.41b0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.ageless.exe.41b0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.ageless.exe.3af0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 7444, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: ageless.exe PID: 7676, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7704, type: MEMORYSTR
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00841204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00841204
                Source: C:\Users\user\Desktop\tN8GsMV1le.exeCode function: 0_2_00841806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00841806
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002D1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,1_2_002D1204
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 1_2_002D1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_002D1806
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002D1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,4_2_002D1204
                Source: C:\Users\user\AppData\Local\flexuosely\ageless.exeCode function: 4_2_002D1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,4_2_002D1806
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information111
                Scripting
                2
                Valid Accounts
                1
                Native API
                111
                Scripting
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                2
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt2
                Valid Accounts
                2
                Valid Accounts
                31
                Obfuscated Files or Information
                Security Account Manager3
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCron2
                Registry Run Keys / Startup Folder
                21
                Access Token Manipulation
                1
                Software Packing
                NTDS127
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets421
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
                Registry Run Keys / Startup Folder
                11
                Masquerading
                Cached Domain Credentials1
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Valid Accounts
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Virtualization/Sandbox Evasion
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                Access Token Manipulation
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
                Process Injection
                Network Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1590073 Sample: tN8GsMV1le Startdate: 13/01/2025 Architecture: WINDOWS Score: 100 30 reallyfreegeoip.org 2->30 32 checkip.dyndns.org 2->32 34 checkip.dyndns.com 2->34 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 Icon mismatch, binary includes an icon from a different legit application in order to fool users 2->44 48 8 other signatures 2->48 8 tN8GsMV1le.exe 3 2->8         started        12 wscript.exe 1 2->12         started        signatures3 46 Tries to detect the country of the analysis system (by using the IP) 30->46 process4 file5 26 C:\Users\user\AppData\Local\...\ageless.exe, PE32 8->26 dropped 54 Binary is likely a compiled AutoIt script file 8->54 56 Found API chain indicative of sandbox detection 8->56 58 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 8->58 14 ageless.exe 1 8->14         started        60 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->60 18 ageless.exe 12->18         started        signatures6 process7 file8 28 C:\Users\user\AppData\Roaming\...\ageless.vbs, data 14->28 dropped 62 Multi AV Scanner detection for dropped file 14->62 64 Binary is likely a compiled AutoIt script file 14->64 66 Machine Learning detection for dropped file 14->66 74 3 other signatures 14->74 20 RegSvcs.exe 15 2 14->20         started        68 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 18->68 70 Writes to foreign memory regions 18->70 72 Maps a DLL or memory area into another process 18->72 24 RegSvcs.exe 2 18->24         started        signatures9 process10 dnsIp11 36 checkip.dyndns.com 132.226.8.169, 49730, 49732, 80 UTMEMUS United States 20->36 38 reallyfreegeoip.org 104.21.32.1, 443, 49731, 49734 CLOUDFLARENETUS United States 20->38 50 Tries to steal Mail credentials (via file / registry access) 24->50 52 Tries to harvest and steal browser information (history, passwords, etc) 24->52 signatures12

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                tN8GsMV1le.exe47%ReversingLabsWin32.Trojan.Generic
                tN8GsMV1le.exe45%VirustotalBrowse
                tN8GsMV1le.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\flexuosely\ageless.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\flexuosely\ageless.exe47%ReversingLabsWin32.Trojan.Generic
                C:\Users\user\AppData\Local\flexuosely\ageless.exe45%VirustotalBrowse
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                104.21.32.1
                truefalse
                  high
                  checkip.dyndns.com
                  132.226.8.169
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                        high
                        https://reallyfreegeoip.org/xml/8.46.123.189false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://reallyfreegeoip.org/xml/8.46.123.189lRegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.comdRegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://checkip.dyndns.org/qageless.exe, 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2986759550.0000000000413000.00000040.80000000.00040000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgdRegSvcs.exe, 00000002.00000002.2988302345.000000000262D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F7D000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/8.46.123.189dRegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.2988302345.000000000262D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F7D000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.orgdRegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://reallyfreegeoip.orgRegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.orgRegSvcs.exe, 00000002.00000002.2988302345.00000000025FE000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F4E000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.comRegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://checkip.dyndns.org/dRegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.2988302345.0000000002591000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F33000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://api.telegram.org/bot-/sendDocument?chat_id=ageless.exe, 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, ageless.exe, 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2986759550.0000000000413000.00000040.80000000.00040000.00000000.sdmpfalse
                                                    high
                                                    https://reallyfreegeoip.org/xml/ageless.exe, 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2988302345.0000000002610000.00000004.00000800.00020000.00000000.sdmp, ageless.exe, 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2988584382.0000000002F60000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000005.00000002.2986759550.0000000000413000.00000040.80000000.00040000.00000000.sdmpfalse
                                                      high
                                                      • No. of IPs < 25%
                                                      • 25% < No. of IPs < 50%
                                                      • 50% < No. of IPs < 75%
                                                      • 75% < No. of IPs
                                                      IPDomainCountryFlagASNASN NameMalicious
                                                      132.226.8.169
                                                      checkip.dyndns.comUnited States
                                                      16989UTMEMUSfalse
                                                      104.21.32.1
                                                      reallyfreegeoip.orgUnited States
                                                      13335CLOUDFLARENETUSfalse
                                                      Joe Sandbox version:42.0.0 Malachite
                                                      Analysis ID:1590073
                                                      Start date and time:2025-01-13 15:07:32 +01:00
                                                      Joe Sandbox product:CloudBasic
                                                      Overall analysis duration:0h 8m 4s
                                                      Hypervisor based Inspection enabled:false
                                                      Report type:full
                                                      Cookbook file name:default.jbs
                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                      Number of analysed new started processes analysed:10
                                                      Number of new started drivers analysed:0
                                                      Number of existing processes analysed:0
                                                      Number of existing drivers analysed:0
                                                      Number of injected processes analysed:0
                                                      Technologies:
                                                      • HCA enabled
                                                      • EGA enabled
                                                      • AMSI enabled
                                                      Analysis Mode:default
                                                      Analysis stop reason:Timeout
                                                      Sample name:tN8GsMV1le.exe
                                                      (renamed file extension from none to exe, renamed because original name is a hash value)
                                                      Original Sample Name:0ed8ca46015ab7478fea92df5e02cee1939cc83f3ab308dd50d973fbce00aa36
                                                      Detection:MAL
                                                      Classification:mal100.troj.spyw.expl.evad.winEXE@10/3@2/2
                                                      EGA Information:
                                                      • Successful, ratio: 75%
                                                      HCA Information:
                                                      • Successful, ratio: 99%
                                                      • Number of executed functions: 45
                                                      • Number of non-executed functions: 307
                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                      • Excluded IPs from analysis (whitelisted): 172.202.163.200, 13.107.246.45
                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                      • Execution Graph export aborted for target RegSvcs.exe, PID 7472 because it is empty
                                                      • Not all processes where analyzed, report is missing behavior information
                                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                      TimeTypeDescription
                                                      14:08:33AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      132.226.8.169QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      Receipt-2502-AJL2024.exeGet hashmaliciousMassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      MBOaS3GRtF.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      fpIGwanLZi.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      4NG0guPiKA.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      uVpytXGpQz.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • checkip.dyndns.org/
                                                      H75MnQEha8.exeGet hashmaliciousMassLogger RATBrowse
                                                      • checkip.dyndns.org/
                                                      7b4Iaf58Rp.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • checkip.dyndns.org/
                                                      104.21.32.124010-KAPSON.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                      • b2csa.icu/PL341/index.php
                                                      bIcqeSVPW6.exeGet hashmaliciousFormBookBrowse
                                                      • www.rafconstrutora.online/sa6l/
                                                      BalphRTkPS.exeGet hashmaliciousFormBookBrowse
                                                      • www.aziziyeescortg.xyz/2pcx/
                                                      25IvlOVEB1.exeGet hashmaliciousFormBookBrowse
                                                      • www.masterqq.pro/3vdc/
                                                      QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                      • www.mzkd6gp5.top/3u0p/
                                                      SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                      • redroomaudio.com/administrator/index.php
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      reallyfreegeoip.orgslime crypted.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.48.1
                                                      rOrders.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.32.1
                                                      MB263350411AE.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 104.21.112.1
                                                      QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.112.1
                                                      Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.32.1
                                                      SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 104.21.112.1
                                                      PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.32.1
                                                      FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.80.1
                                                      QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 104.21.80.1
                                                      Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.64.1
                                                      checkip.dyndns.comslime crypted.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 193.122.130.0
                                                      rOrders.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 132.226.247.73
                                                      MB263350411AE.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 193.122.130.0
                                                      QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 132.226.8.169
                                                      Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 193.122.130.0
                                                      SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 158.101.44.242
                                                      PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 132.226.8.169
                                                      FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 158.101.44.242
                                                      QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 132.226.247.73
                                                      Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 132.226.247.73
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      UTMEMUSrOrders.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 132.226.247.73
                                                      QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 132.226.8.169
                                                      PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 132.226.8.169
                                                      QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 132.226.247.73
                                                      Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 132.226.247.73
                                                      Receipt-2502-AJL2024.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 132.226.8.169
                                                      JWPRnfqs3n.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 132.226.247.73
                                                      c7WJL1gt32.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.8.169
                                                      14lVOjBoI2.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                      • 132.226.247.73
                                                      rlPy5vt1Dg.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 132.226.247.73
                                                      CLOUDFLARENETUShttps://deltacapoffers.com/prequalification.php?utm_source=klayvio&utm_medium=email&utm_campaign=scrapeddripcampaign&utm_id=efi&utm_term=efi&utm_content=scrapedlists6&_kx=YFJgSt5YAM6jpJldJ4ZDop7CB1jVRJhqJKw59Uk4HMU.QZibAuGet hashmaliciousUnknownBrowse
                                                      • 104.17.25.14
                                                      http://organismekina8at-my.sharepoint.com/:f:/g/personal/mariejoelle_tremblay_kina8at_ca/ErWnJRn_SWBKkEcx4yGorhMBtA4m6tEq5cYuHnwwp_z1SwGet hashmaliciousUnknownBrowse
                                                      • 188.114.96.3
                                                      slime crypted.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.48.1
                                                      http://id1223.adsalliance.xyzGet hashmaliciousUnknownBrowse
                                                      • 162.247.243.29
                                                      Cardfactory Executed Agreement DocsID- Sign & Review..emlGet hashmaliciousHTMLPhisherBrowse
                                                      • 104.18.11.207
                                                      http://unioneconselvano.it/0kktkM-VkjxP-cvXwg-XC4J3-7f72j-pfTsY-7uK529r.phpGet hashmaliciousUnknownBrowse
                                                      • 1.1.1.1
                                                      https://www.google.ca/url?subgn1=https://www.fordbeckerandgutierrez.com&SQ=WA&SQ=F5&SQ=R7&TA=W4&SQ=L6&q=%2561%256d%2570%2F%2573%256D%2569%2568%256B%2538%252E%2564%2565%256B%2563%2568%256F%2562%2574%2569%2565%2577%252E%2563%256F%256D%252F%256A%2576%2561%256E%256E%2561%2574%2574%2565%256E%2540%2561%2572%2572%256F%2577%2562%2561%256E%256B%252E%2563%256F%256D&opdg=ejM&cFQ=QXo&STA=MHYGet hashmaliciousHTMLPhisherBrowse
                                                      • 104.17.245.203
                                                      https://emailcaptain.pages.dev/dimitar?login=eXVsdXlldl9hbkByZnMucnU=&page=_adobeGet hashmaliciousUnknownBrowse
                                                      • 172.67.169.194
                                                      DOCS974i7C63.pdfGet hashmaliciousHTMLPhisherBrowse
                                                      • 104.17.25.14
                                                      NVIDIAShare.exe.bin.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                      • 104.21.64.1
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      54328bd36c14bd82ddaa0c04b25ed9adslime crypted.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.32.1
                                                      rOrders.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.32.1
                                                      MB263350411AE.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 104.21.32.1
                                                      QUOTATION REQUIRED_Enatel s.r.l..bat.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.32.1
                                                      Remittance Advice.exeGet hashmaliciousMassLogger RATBrowse
                                                      • 104.21.32.1
                                                      SOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 104.21.32.1
                                                      PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                      • 104.21.32.1
                                                      FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.32.1
                                                      QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                      • 104.21.32.1
                                                      Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                      • 104.21.32.1
                                                      No context
                                                      Process:C:\Users\user\Desktop\tN8GsMV1le.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):93696
                                                      Entropy (8bit):6.860662311761124
                                                      Encrypted:false
                                                      SSDEEP:1536:Q5wlQlPRHa+XJvc4HSrrXGrca9tvDVEo2OE5dMbB7xkBW+uc6+dJLRQTJ2S2CGn:O5Da+5k2MrXGYafeoy5d2xknh62RQTJ8
                                                      MD5:DC7479346270CAAF59A1DD44DB20A829
                                                      SHA1:3E7BB7950221EC62BE7723FD07045F9894F334EC
                                                      SHA-256:EBF09F88C0E561D1AED529B4CFC6A53B026998EAE66D1E6513A0F646529B6AE7
                                                      SHA-512:41030BF6E58549828A78539EABF116AE95AFBD6D026D3CEE12AD1A0F02EBDC3541B78BCB9DED4C105CD1563D89BCE63B269D69DDE79FBA08C5136D707882C039
                                                      Malicious:false
                                                      Reputation:low
                                                      Preview:.k.2PELYAZ34..DU.SCCY0VL.WF1E2SELYEZ34QCDUESCCY0VLXWF1E2SELY.Z34_\.[E.J.x.W..v.Y,As5>6"(RYq %;+<7c;Uv>-9fX+....y(5WQ.NI_aSCCY0VL..F1.3PE...34QCDUES.C[1]M.WFUD2SMLYEZ34..EUEsCCY.WLXW.1E.SEL[EZ74QCDUESECY0VLXWF.D2SGLYEZ34SC$.ESSCY VLXWV1E"SELYEZ#4QCDUESCCY0..YW.1E2S.MY._34QCDUESCCY0VLXWF1E.RE@YEZ34QCDUESCCY0VLXWF1E2SELYEZ34QCDUESCCY0VLXWF1E2SELyEZ;4QCDUESCCY0^lXW.1E2SELYEZ34.7!-1SCC.RWLXwF1EVREL[EZ34QCDUESCCY0vLX7hC6@0ELY._34Q.EUEUCCYVWLXWF1E2SELYEZs4Q.j' ?, Y0ZLXWF.D2SGLYE624QCDUESCCY0VL.WFsE2SELYEZ34QCDUESs.X0VLXW.1E2QEIY..34..DUFSCC.0VJ.F1.2SELYEZ34QCDUESCCY0VLXWF1E2SELYEZ34QCDUESCC.M.C..X6..ELYEZ35S@@SM[CCY0VLXW81E2.ELY.Z34fCDU`SCC40VL|WF1;2SE2YEZW4QC6UES"CY0.LXW)1E2=ELY;Z34OAlJESIi.0TdxWF;E..6mYEP.5QC@&gSCI.2VL\$e1E8.FLYA).4QI.QESG0|0VF.RF1A..EO.S\34J,|UEYC@.%PLXLl.E0{|LYOZ..Q@.@CSCXs.VN.^F1A..6QYE\.vQCN!LSCA.:VL\}X3mqSEFsg$ 4QGoUoq=WY0RgX}dOP2SAgYoxM"QC@~Eya=N0VHsWl7oPS7.UE*0[0CDSm.CCS..LXQF..2-KLYAX\.QCNsoiCk.0VJX..1E4So.Y;i34UoC+vSCGr&(}XWB.CJSEJ*.Z3>t.wUEWk.Y0\Lr.F..2SCLq.Z32
                                                      Process:C:\Users\user\Desktop\tN8GsMV1le.exe
                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                      Category:dropped
                                                      Size (bytes):665600
                                                      Entropy (8bit):7.929162536945725
                                                      Encrypted:false
                                                      SSDEEP:12288:PsHzOUNUSB/o5LsI1uwajJ5yvv1l2prD5jZUdhA2fSHa2oHzIiGZ6nQ:eiUmSB/o5d1ubcvcrNjZi7thEi+6Q
                                                      MD5:80D1696D1FAEB3A13686B7AD4620E8AF
                                                      SHA1:4181929B796B7FD1583AA3E2ADD32D89F1D753C3
                                                      SHA-256:0ED8CA46015AB7478FEA92DF5E02CEE1939CC83F3AB308DD50D973FBCE00AA36
                                                      SHA-512:7668327F6BF157D23F8055DA68CAF4EA6B3516E8C664D24E56512282C86B905B559A8484A7E449158B1C651B9EE22041E5C947641027F0E275533E3AC9128C70
                                                      Malicious:true
                                                      Antivirus:
                                                      • Antivirus: Joe Sandbox ML, Detection: 100%
                                                      • Antivirus: ReversingLabs, Detection: 47%
                                                      • Antivirus: Virustotal, Detection: 45%, Browse
                                                      Reputation:low
                                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L......g.........."..........`....................@.......................................@...@.......@.....................`...$.......`U..........................................................................................................UPX0....................................UPX1................................@....rsrc....`.......Z..................@..............................................................................................................................................................................................................................................................................................................................................3.91.UPX!....
                                                      Process:C:\Users\user\AppData\Local\flexuosely\ageless.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):276
                                                      Entropy (8bit):3.387641022869369
                                                      Encrypted:false
                                                      SSDEEP:6:DMM8lfm3OOQdUfcloRKUEZ+lX1G/JgLlm6nriIM8lfQVn:DsO+vNloRKQ1wORm4mA2n
                                                      MD5:0AD3EE70704C86C853A00415B0BE0C54
                                                      SHA1:101869F8C3F9AFA170C7B77579C53528C459F205
                                                      SHA-256:12E181ECBC5FC8BD269EFAF53A2A6DEC49C0DA34DDE82F139A4DCF03D3F9BA02
                                                      SHA-512:2AC1663C490AF0FC68BF37C0EE83053DCC9AB5E38D2116508B50DAE1097DD129C63001F17E5A5A409F0A287ABEE174CAEC2D753D560936288E8D33D48FE79F25
                                                      Malicious:true
                                                      Reputation:low
                                                      Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.f.l.e.x.u.o.s.e.l.y.\.a.g.e.l.e.s.s...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed
                                                      Entropy (8bit):7.929162536945725
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.39%
                                                      • UPX compressed Win32 Executable (30571/9) 0.30%
                                                      • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      File name:tN8GsMV1le.exe
                                                      File size:665'600 bytes
                                                      MD5:80d1696d1faeb3a13686b7ad4620e8af
                                                      SHA1:4181929b796b7fd1583aa3e2add32d89f1d753c3
                                                      SHA256:0ed8ca46015ab7478fea92df5e02cee1939cc83f3ab308dd50d973fbce00aa36
                                                      SHA512:7668327f6bf157d23f8055da68caf4ea6b3516e8c664d24e56512282c86b905b559a8484a7e449158b1c651b9ee22041e5c947641027f0e275533e3ac9128c70
                                                      SSDEEP:12288:PsHzOUNUSB/o5LsI1uwajJ5yvv1l2prD5jZUdhA2fSHa2oHzIiGZ6nQ:eiUmSB/o5d1ubcvcrNjZi7thEi+6Q
                                                      TLSH:B1E423176880A90CD6E236FD70F095B6A336BDA015348196DEF4BFA48E31263CDC55ED
                                                      File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                      Icon Hash:8f82989919951d01
                                                      Entrypoint:0x52a700
                                                      Entrypoint Section:UPX1
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x67838B19 [Sun Jan 12 09:27:53 2025 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:1
                                                      File Version Major:5
                                                      File Version Minor:1
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:1
                                                      Import Hash:21371b611d91188d602926b15db6bd48
                                                      Instruction
                                                      pushad
                                                      mov esi, 004CE000h
                                                      lea edi, dword ptr [esi-000CD000h]
                                                      mov dword ptr [edi+000CF740h], 13800C02h
                                                      push edi
                                                      jmp 00007FEE00C8A4A3h
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      nop
                                                      mov al, byte ptr [esi]
                                                      inc esi
                                                      mov byte ptr [edi], al
                                                      inc edi
                                                      add ebx, ebx
                                                      jne 00007FEE00C8A499h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jc 00007FEE00C8A47Fh
                                                      mov eax, 00000001h
                                                      add ebx, ebx
                                                      jne 00007FEE00C8A499h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      adc eax, eax
                                                      add ebx, ebx
                                                      jnc 00007FEE00C8A49Dh
                                                      jne 00007FEE00C8A4BAh
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jc 00007FEE00C8A4B1h
                                                      dec eax
                                                      add ebx, ebx
                                                      jne 00007FEE00C8A499h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      adc eax, eax
                                                      jmp 00007FEE00C8A466h
                                                      add ebx, ebx
                                                      jne 00007FEE00C8A499h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      adc ecx, ecx
                                                      jmp 00007FEE00C8A4E4h
                                                      xor ecx, ecx
                                                      sub eax, 03h
                                                      jc 00007FEE00C8A4A3h
                                                      shl eax, 08h
                                                      mov al, byte ptr [esi]
                                                      inc esi
                                                      xor eax, FFFFFFFFh
                                                      je 00007FEE00C8A507h
                                                      sar eax, 1
                                                      mov ebp, eax
                                                      jmp 00007FEE00C8A49Dh
                                                      add ebx, ebx
                                                      jne 00007FEE00C8A499h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jc 00007FEE00C8A45Eh
                                                      inc ecx
                                                      add ebx, ebx
                                                      jne 00007FEE00C8A499h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jc 00007FEE00C8A450h
                                                      add ebx, ebx
                                                      jne 00007FEE00C8A499h
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      adc ecx, ecx
                                                      add ebx, ebx
                                                      jnc 00007FEE00C8A481h
                                                      jne 00007FEE00C8A49Bh
                                                      mov ebx, dword ptr [esi]
                                                      sub esi, FFFFFFFCh
                                                      adc ebx, ebx
                                                      jnc 00007FEE00C8A476h
                                                      add ecx, 02h
                                                      cmp ebp, 00000000h
                                                      Programming Language:
                                                      • [ C ] VS2008 SP1 build 30729
                                                      • [IMP] VS2008 SP1 build 30729
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x1705600x424.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x12b0000x45560.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1709840x14.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x12a8f40x18UPX1
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x12a9140xa0UPX1
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      UPX00x10000xcd0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      UPX10xce0000x5d0000x5ca00d1f2fc73ca6587fa0298827cef415a4fFalse0.9885158358636977data7.936945176873406IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0x12b0000x460000x45a0053a0ce906c987d5e50f842d0381661f4False0.9114185929084381data7.86236761444327IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_ICON0x12b4ec0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                      RT_ICON0x12b6180x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                      RT_ICON0x12b7440x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                      RT_ICON0x12b8700x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.5487588652482269
                                                      RT_ICON0x12bcdc0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishGreat Britain0.37922138836772984
                                                      RT_ICON0x12cd880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishGreat Britain0.28060165975103735
                                                      RT_ICON0x12f3340x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishGreat Britain0.25614076523382145
                                                      RT_MENU0xdc5400x50dataEnglishGreat Britain1.1375
                                                      RT_STRING0xdc5900x594dataEnglishGreat Britain1.007703081232493
                                                      RT_STRING0xdcb240x68adataEnglishGreat Britain1.0065710872162486
                                                      RT_STRING0xdd1b00x490dataEnglishGreat Britain1.009417808219178
                                                      RT_STRING0xdd6400x5fcdataEnglishGreat Britain1.0071801566579635
                                                      RT_STRING0xddc3c0x65cdataEnglishGreat Britain1.0067567567567568
                                                      RT_STRING0xde2980x466COM executable for DOSEnglishGreat Britain1.0097690941385435
                                                      RT_STRING0xde7000x158dataEnglishGreat Britain1.0319767441860466
                                                      RT_RCDATA0x1335600x3ca9edata1.000346107100025
                                                      RT_GROUP_ICON0x1700040x3edataEnglishGreat Britain0.8387096774193549
                                                      RT_GROUP_ICON0x1700480x14dataEnglishGreat Britain1.25
                                                      RT_GROUP_ICON0x1700600x14dataEnglishGreat Britain1.15
                                                      RT_GROUP_ICON0x1700780x14dataEnglishGreat Britain1.25
                                                      RT_VERSION0x1700900xdcdataEnglishGreat Britain0.6181818181818182
                                                      RT_MANIFEST0x1701700x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                      DLLImport
                                                      KERNEL32.DLLLoadLibraryA, GetProcAddress, VirtualProtect, VirtualAlloc, VirtualFree, ExitProcess
                                                      ADVAPI32.dllGetAce
                                                      COMCTL32.dllImageList_Remove
                                                      COMDLG32.dllGetSaveFileNameW
                                                      GDI32.dllLineTo
                                                      IPHLPAPI.DLLIcmpSendEcho
                                                      MPR.dllWNetGetConnectionW
                                                      ole32.dllCoGetObject
                                                      OLEAUT32.dllOleLoadPicture
                                                      PSAPI.DLLGetProcessMemoryInfo
                                                      SHELL32.dllDragFinish
                                                      USER32.dllGetDC
                                                      USERENV.dllLoadUserProfileW
                                                      UxTheme.dllIsThemeActive
                                                      VERSION.dllVerQueryValueW
                                                      WININET.dllFtpOpenFileW
                                                      WINMM.dlltimeGetTime
                                                      WSOCK32.dllconnect
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishGreat Britain
                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                      2025-01-13T15:08:34.055922+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449730132.226.8.16980TCP
                                                      2025-01-13T15:08:46.649609+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449732132.226.8.16980TCP
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 13, 2025 15:08:32.803597927 CET4973080192.168.2.4132.226.8.169
                                                      Jan 13, 2025 15:08:32.808620930 CET8049730132.226.8.169192.168.2.4
                                                      Jan 13, 2025 15:08:32.808760881 CET4973080192.168.2.4132.226.8.169
                                                      Jan 13, 2025 15:08:32.828130007 CET4973080192.168.2.4132.226.8.169
                                                      Jan 13, 2025 15:08:32.833178043 CET8049730132.226.8.169192.168.2.4
                                                      Jan 13, 2025 15:08:33.699239969 CET8049730132.226.8.169192.168.2.4
                                                      Jan 13, 2025 15:08:33.707763910 CET4973080192.168.2.4132.226.8.169
                                                      Jan 13, 2025 15:08:33.712697983 CET8049730132.226.8.169192.168.2.4
                                                      Jan 13, 2025 15:08:34.015433073 CET8049730132.226.8.169192.168.2.4
                                                      Jan 13, 2025 15:08:34.026268005 CET49731443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:34.026330948 CET44349731104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:34.026415110 CET49731443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:34.055922031 CET4973080192.168.2.4132.226.8.169
                                                      Jan 13, 2025 15:08:34.085014105 CET49731443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:34.085059881 CET44349731104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:34.583304882 CET44349731104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:34.583431005 CET49731443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:34.590853930 CET49731443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:34.590882063 CET44349731104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:34.591223001 CET44349731104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:34.633997917 CET49731443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:34.640672922 CET49731443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:34.683373928 CET44349731104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:34.756454945 CET44349731104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:34.756681919 CET44349731104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:34.756973028 CET49731443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:34.762955904 CET49731443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:45.436870098 CET4973280192.168.2.4132.226.8.169
                                                      Jan 13, 2025 15:08:45.442497969 CET8049732132.226.8.169192.168.2.4
                                                      Jan 13, 2025 15:08:45.442569017 CET4973280192.168.2.4132.226.8.169
                                                      Jan 13, 2025 15:08:45.442889929 CET4973280192.168.2.4132.226.8.169
                                                      Jan 13, 2025 15:08:45.448235035 CET8049732132.226.8.169192.168.2.4
                                                      Jan 13, 2025 15:08:46.294251919 CET8049732132.226.8.169192.168.2.4
                                                      Jan 13, 2025 15:08:46.297972918 CET4973280192.168.2.4132.226.8.169
                                                      Jan 13, 2025 15:08:46.302872896 CET8049732132.226.8.169192.168.2.4
                                                      Jan 13, 2025 15:08:46.597562075 CET8049732132.226.8.169192.168.2.4
                                                      Jan 13, 2025 15:08:46.599389076 CET49734443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:46.599469900 CET44349734104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:46.599754095 CET49734443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:46.603780031 CET49734443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:46.603805065 CET44349734104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:46.649609089 CET4973280192.168.2.4132.226.8.169
                                                      Jan 13, 2025 15:08:47.068599939 CET44349734104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:47.068727970 CET49734443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:47.070436954 CET49734443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:47.070466042 CET44349734104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:47.071010113 CET44349734104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:47.118365049 CET49734443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:47.157795906 CET49734443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:47.199361086 CET44349734104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:47.302088022 CET44349734104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:47.302237034 CET44349734104.21.32.1192.168.2.4
                                                      Jan 13, 2025 15:08:47.302293062 CET49734443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:08:47.306010962 CET49734443192.168.2.4104.21.32.1
                                                      Jan 13, 2025 15:09:39.010864019 CET8049730132.226.8.169192.168.2.4
                                                      Jan 13, 2025 15:09:39.010952950 CET4973080192.168.2.4132.226.8.169
                                                      Jan 13, 2025 15:09:51.591379881 CET8049732132.226.8.169192.168.2.4
                                                      Jan 13, 2025 15:09:51.591535091 CET4973280192.168.2.4132.226.8.169
                                                      Jan 13, 2025 15:10:14.024769068 CET4973080192.168.2.4132.226.8.169
                                                      Jan 13, 2025 15:10:14.030747890 CET8049730132.226.8.169192.168.2.4
                                                      Jan 13, 2025 15:10:26.602588892 CET4973280192.168.2.4132.226.8.169
                                                      Jan 13, 2025 15:10:26.607486963 CET8049732132.226.8.169192.168.2.4
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Jan 13, 2025 15:08:32.785182953 CET5134053192.168.2.41.1.1.1
                                                      Jan 13, 2025 15:08:32.792376995 CET53513401.1.1.1192.168.2.4
                                                      Jan 13, 2025 15:08:34.017265081 CET5552453192.168.2.41.1.1.1
                                                      Jan 13, 2025 15:08:34.025415897 CET53555241.1.1.1192.168.2.4
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Jan 13, 2025 15:08:32.785182953 CET192.168.2.41.1.1.10x83dbStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                      Jan 13, 2025 15:08:34.017265081 CET192.168.2.41.1.1.10x158dStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Jan 13, 2025 15:08:32.792376995 CET1.1.1.1192.168.2.40x83dbNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                      Jan 13, 2025 15:08:32.792376995 CET1.1.1.1192.168.2.40x83dbNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                      Jan 13, 2025 15:08:32.792376995 CET1.1.1.1192.168.2.40x83dbNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                      Jan 13, 2025 15:08:32.792376995 CET1.1.1.1192.168.2.40x83dbNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                      Jan 13, 2025 15:08:32.792376995 CET1.1.1.1192.168.2.40x83dbNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                      Jan 13, 2025 15:08:32.792376995 CET1.1.1.1192.168.2.40x83dbNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                      Jan 13, 2025 15:08:34.025415897 CET1.1.1.1192.168.2.40x158dNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                      Jan 13, 2025 15:08:34.025415897 CET1.1.1.1192.168.2.40x158dNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                      Jan 13, 2025 15:08:34.025415897 CET1.1.1.1192.168.2.40x158dNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                      Jan 13, 2025 15:08:34.025415897 CET1.1.1.1192.168.2.40x158dNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                      Jan 13, 2025 15:08:34.025415897 CET1.1.1.1192.168.2.40x158dNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                      Jan 13, 2025 15:08:34.025415897 CET1.1.1.1192.168.2.40x158dNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                      Jan 13, 2025 15:08:34.025415897 CET1.1.1.1192.168.2.40x158dNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                      • reallyfreegeoip.org
                                                      • checkip.dyndns.org
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.449730132.226.8.169807472C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 13, 2025 15:08:32.828130007 CET151OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                      Host: checkip.dyndns.org
                                                      Connection: Keep-Alive
                                                      Jan 13, 2025 15:08:33.699239969 CET273INHTTP/1.1 200 OK
                                                      Date: Mon, 13 Jan 2025 14:08:33 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 104
                                                      Connection: keep-alive
                                                      Cache-Control: no-cache
                                                      Pragma: no-cache
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                      Jan 13, 2025 15:08:33.707763910 CET127OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                      Host: checkip.dyndns.org
                                                      Jan 13, 2025 15:08:34.015433073 CET273INHTTP/1.1 200 OK
                                                      Date: Mon, 13 Jan 2025 14:08:33 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 104
                                                      Connection: keep-alive
                                                      Cache-Control: no-cache
                                                      Pragma: no-cache
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.449732132.226.8.169807704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      Jan 13, 2025 15:08:45.442889929 CET151OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                      Host: checkip.dyndns.org
                                                      Connection: Keep-Alive
                                                      Jan 13, 2025 15:08:46.294251919 CET273INHTTP/1.1 200 OK
                                                      Date: Mon, 13 Jan 2025 14:08:46 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 104
                                                      Connection: keep-alive
                                                      Cache-Control: no-cache
                                                      Pragma: no-cache
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                      Jan 13, 2025 15:08:46.297972918 CET127OUTGET / HTTP/1.1
                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                      Host: checkip.dyndns.org
                                                      Jan 13, 2025 15:08:46.597562075 CET273INHTTP/1.1 200 OK
                                                      Date: Mon, 13 Jan 2025 14:08:46 GMT
                                                      Content-Type: text/html
                                                      Content-Length: 104
                                                      Connection: keep-alive
                                                      Cache-Control: no-cache
                                                      Pragma: no-cache
                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.449731104.21.32.14437472C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-13 14:08:34 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                      Host: reallyfreegeoip.org
                                                      Connection: Keep-Alive
                                                      2025-01-13 14:08:34 UTC857INHTTP/1.1 200 OK
                                                      Date: Mon, 13 Jan 2025 14:08:34 GMT
                                                      Content-Type: text/xml
                                                      Content-Length: 362
                                                      Connection: close
                                                      Age: 2092103
                                                      Cache-Control: max-age=31536000
                                                      cf-cache-status: HIT
                                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1dc5e1M%2FLpAudMIQAj8RpQjNi%2BwbMkhKGkXp7k3KjG8sOj0YLaCajB4r2%2BmKts2TnfUAR7eGRyPpctoSOBgK6Io1XELNHmx5bQjacrQ8RUeJl8ckELU%2FADzpGDoGfGFOF47Z21mz"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 9015f588c80472b9-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1788&min_rtt=1779&rtt_var=687&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1571582&cwnd=217&unsent_bytes=0&cid=fecdc43ebd4ceee2&ts=192&x=0"
                                                      2025-01-13 14:08:34 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      1192.168.2.449734104.21.32.14437704C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      TimestampBytes transferredDirectionData
                                                      2025-01-13 14:08:47 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                      Host: reallyfreegeoip.org
                                                      Connection: Keep-Alive
                                                      2025-01-13 14:08:47 UTC863INHTTP/1.1 200 OK
                                                      Date: Mon, 13 Jan 2025 14:08:47 GMT
                                                      Content-Type: text/xml
                                                      Content-Length: 362
                                                      Connection: close
                                                      Age: 2092116
                                                      Cache-Control: max-age=31536000
                                                      cf-cache-status: HIT
                                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PinwbJ%2BkffVT0Y09SFU06bCyE9d1kB9oM9NISA%2Fa7jyYno%2BtfBsWlXmz0PCsnH3mzAvFxH5LTII%2F2t9Gx%2Fmq3FrwQKbtUjFxc%2BKOLnV%2BJGW29RZ8FY7VOMJiTADxox0XQUiSgv7b"}],"group":"cf-nel","max_age":604800}
                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                      Server: cloudflare
                                                      CF-RAY: 9015f5d73dc18cda-EWR
                                                      alt-svc: h3=":443"; ma=86400
                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1774&min_rtt=1766&rtt_var=679&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1590413&cwnd=244&unsent_bytes=0&cid=8c9e9612169bda49&ts=242&x=0"
                                                      2025-01-13 14:08:47 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:09:08:29
                                                      Start date:13/01/2025
                                                      Path:C:\Users\user\Desktop\tN8GsMV1le.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\tN8GsMV1le.exe"
                                                      Imagebase:0x7c0000
                                                      File size:665'600 bytes
                                                      MD5 hash:80D1696D1FAEB3A13686B7AD4620E8AF
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:1
                                                      Start time:09:08:29
                                                      Start date:13/01/2025
                                                      Path:C:\Users\user\AppData\Local\flexuosely\ageless.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\tN8GsMV1le.exe"
                                                      Imagebase:0x250000
                                                      File size:665'600 bytes
                                                      MD5 hash:80D1696D1FAEB3A13686B7AD4620E8AF
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000001.00000002.1759954673.0000000003AF0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                      Antivirus matches:
                                                      • Detection: 100%, Joe Sandbox ML
                                                      • Detection: 47%, ReversingLabs
                                                      • Detection: 45%, Virustotal, Browse
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:09:08:30
                                                      Start date:13/01/2025
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\tN8GsMV1le.exe"
                                                      Imagebase:0x2f0000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2988302345.00000000026B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Target ID:3
                                                      Start time:09:08:42
                                                      Start date:13/01/2025
                                                      Path:C:\Windows\System32\wscript.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ageless.vbs"
                                                      Imagebase:0x7ff6a2e50000
                                                      File size:170'496 bytes
                                                      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:09:08:43
                                                      Start date:13/01/2025
                                                      Path:C:\Users\user\AppData\Local\flexuosely\ageless.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Local\flexuosely\ageless.exe"
                                                      Imagebase:0x250000
                                                      File size:665'600 bytes
                                                      MD5 hash:80D1696D1FAEB3A13686B7AD4620E8AF
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                      • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000004.00000002.1889243084.00000000041B0000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:5
                                                      Start time:09:08:44
                                                      Start date:13/01/2025
                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\AppData\Local\flexuosely\ageless.exe"
                                                      Imagebase:0xb30000
                                                      File size:45'984 bytes
                                                      MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                      Has elevated privileges:false
                                                      Has administrator privileges:false
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2988584382.0000000003005000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:high
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:2.4%
                                                        Dynamic/Decrypted Code Coverage:1.2%
                                                        Signature Coverage:5.5%
                                                        Total number of Nodes:1560
                                                        Total number of Limit Nodes:45
                                                        execution_graph 95156 813a41 95160 8310c0 95156->95160 95158 813a4c 95159 8310c0 53 API calls 95158->95159 95159->95158 95161 8310fa 95160->95161 95166 8310cd 95160->95166 95161->95158 95162 8310fc 95204 7dfa11 53 API calls 95162->95204 95164 831101 95171 7c7510 95164->95171 95166->95161 95166->95162 95166->95164 95169 8310f4 95166->95169 95203 7cb270 39 API calls 95169->95203 95172 7c7525 95171->95172 95173 7c7522 95171->95173 95174 7c752d 95172->95174 95175 7c755b 95172->95175 95194 7c6350 95173->95194 95205 7e51c6 26 API calls 95174->95205 95176 8050f6 95175->95176 95178 7c756d 95175->95178 95186 80500f 95175->95186 95234 7e5183 26 API calls 95176->95234 95222 7dfb21 51 API calls 95178->95222 95179 7c753d 95206 7dfddb 95179->95206 95181 80510e 95181->95181 95185 805088 95233 7dfb21 51 API calls 95185->95233 95186->95185 95223 7dfe0b 95186->95223 95187 7c7547 95216 7c9cb3 95187->95216 95190 805058 95191 7dfddb 22 API calls 95190->95191 95192 80507f 95191->95192 95193 7c9cb3 22 API calls 95192->95193 95193->95185 95195 804a51 95194->95195 95196 7c6362 95194->95196 95260 7c4a88 22 API calls __fread_nolock 95195->95260 95250 7c6373 95196->95250 95199 7c636e 95199->95161 95200 804a5b 95202 804a67 95200->95202 95261 7ca8c7 95200->95261 95203->95161 95204->95164 95205->95179 95209 7dfde0 95206->95209 95208 7dfdfa 95208->95187 95209->95208 95212 7dfdfc 95209->95212 95235 7eea0c 95209->95235 95242 7e4ead 7 API calls 2 library calls 95209->95242 95211 7e066d 95244 7e32a4 RaiseException 95211->95244 95212->95211 95243 7e32a4 RaiseException 95212->95243 95214 7e068a 95214->95187 95217 7c9cc2 _wcslen 95216->95217 95218 7dfe0b 22 API calls 95217->95218 95219 7c9cea __fread_nolock 95218->95219 95220 7dfddb 22 API calls 95219->95220 95221 7c9d00 95220->95221 95221->95173 95222->95179 95225 7dfddb 95223->95225 95224 7eea0c ___std_exception_copy 21 API calls 95224->95225 95225->95224 95226 7dfdfa 95225->95226 95229 7dfdfc 95225->95229 95247 7e4ead 7 API calls 2 library calls 95225->95247 95226->95190 95228 7e066d 95249 7e32a4 RaiseException 95228->95249 95229->95228 95248 7e32a4 RaiseException 95229->95248 95231 7e068a 95231->95190 95233->95176 95234->95181 95240 7f3820 __dosmaperr 95235->95240 95236 7f385e 95246 7ef2d9 20 API calls __dosmaperr 95236->95246 95238 7f3849 RtlAllocateHeap 95239 7f385c 95238->95239 95238->95240 95239->95209 95240->95236 95240->95238 95245 7e4ead 7 API calls 2 library calls 95240->95245 95242->95209 95243->95211 95244->95214 95245->95240 95246->95239 95247->95225 95248->95228 95249->95231 95251 7c6382 95250->95251 95256 7c63b6 __fread_nolock 95250->95256 95252 804a82 95251->95252 95253 7c63a9 95251->95253 95251->95256 95255 7dfddb 22 API calls 95252->95255 95265 7ca587 95253->95265 95257 804a91 95255->95257 95256->95199 95258 7dfe0b 22 API calls 95257->95258 95259 804ac5 __fread_nolock 95258->95259 95260->95200 95262 7ca8ea __fread_nolock 95261->95262 95263 7ca8db 95261->95263 95262->95202 95263->95262 95264 7dfe0b 22 API calls 95263->95264 95264->95262 95266 7ca598 __fread_nolock 95265->95266 95267 7ca59d 95265->95267 95266->95256 95268 80f80f 95267->95268 95269 7dfe0b 22 API calls 95267->95269 95269->95266 95270 812a00 95284 7cd7b0 messages 95270->95284 95271 7cdb11 PeekMessageW 95271->95284 95272 7cd807 GetInputState 95272->95271 95272->95284 95274 811cbe TranslateAcceleratorW 95274->95284 95275 7cda04 timeGetTime 95275->95284 95276 7cdb8f PeekMessageW 95276->95284 95277 7cdb73 TranslateMessage DispatchMessageW 95277->95276 95278 7cdbaf Sleep 95295 7cdbc0 95278->95295 95279 812b74 Sleep 95279->95295 95280 7de551 timeGetTime 95280->95295 95281 811dda timeGetTime 95390 7de300 23 API calls 95281->95390 95284->95271 95284->95272 95284->95274 95284->95275 95284->95276 95284->95277 95284->95278 95284->95279 95284->95281 95289 7cd9d5 95284->95289 95302 7cdd50 95284->95302 95309 7cdfd0 95284->95309 95332 7d1310 95284->95332 95388 7cbf40 207 API calls 2 library calls 95284->95388 95389 7dedf6 IsDialogMessageW GetClassLongW 95284->95389 95391 833a2a 23 API calls 95284->95391 95392 7cec40 95284->95392 95416 83359c 82 API calls __wsopen_s 95284->95416 95285 812c0b GetExitCodeProcess 95290 812c21 WaitForSingleObject 95285->95290 95291 812c37 CloseHandle 95285->95291 95286 812a31 95286->95289 95287 8529bf GetForegroundWindow 95287->95295 95290->95284 95290->95291 95291->95295 95292 812ca9 Sleep 95292->95284 95295->95280 95295->95284 95295->95285 95295->95286 95295->95287 95295->95289 95295->95292 95417 845658 23 API calls 95295->95417 95418 82e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95295->95418 95419 82d4dc 47 API calls 95295->95419 95303 7cdd6f 95302->95303 95304 7cdd83 95302->95304 95420 7cd260 207 API calls 2 library calls 95303->95420 95421 83359c 82 API calls __wsopen_s 95304->95421 95306 7cdd7a 95306->95284 95308 812f75 95308->95308 95311 7ce010 95309->95311 95310 7cec40 207 API calls 95321 7ce0dc messages 95310->95321 95311->95321 95424 7e0242 5 API calls __Init_thread_wait 95311->95424 95314 812fca 95314->95321 95425 7ca961 95314->95425 95315 7ca961 22 API calls 95315->95321 95321->95310 95321->95315 95326 7ca8c7 22 API calls 95321->95326 95327 83359c 82 API calls 95321->95327 95328 7ce3e1 95321->95328 95329 7d04f0 22 API calls 95321->95329 95422 7ca81b 41 API calls 95321->95422 95423 7da308 207 API calls 95321->95423 95432 7e0242 5 API calls __Init_thread_wait 95321->95432 95433 7e00a3 29 API calls __onexit 95321->95433 95434 7e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent 95321->95434 95435 8447d4 207 API calls 95321->95435 95436 8468c1 207 API calls 95321->95436 95322 812fee 95431 7e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent 95322->95431 95326->95321 95327->95321 95328->95284 95329->95321 95333 7d1376 95332->95333 95334 7d17b0 95332->95334 95336 816331 95333->95336 95437 7d1940 95333->95437 95599 7e0242 5 API calls __Init_thread_wait 95334->95599 95558 84709c 95336->95558 95337 7d17ba 95340 7d17fb 95337->95340 95343 7c9cb3 22 API calls 95337->95343 95346 816346 95340->95346 95348 7d182c 95340->95348 95341 81633d 95341->95284 95352 7d17d4 95343->95352 95344 7d1940 9 API calls 95345 7d13b6 95344->95345 95345->95340 95347 7d13ec 95345->95347 95604 83359c 82 API calls __wsopen_s 95346->95604 95347->95346 95371 7d1408 __fread_nolock 95347->95371 95601 7caceb 23 API calls messages 95348->95601 95351 7d1839 95602 7dd217 207 API calls 95351->95602 95600 7e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent 95352->95600 95355 81636e 95605 83359c 82 API calls __wsopen_s 95355->95605 95356 7d152f 95358 8163d1 95356->95358 95359 7d153c 95356->95359 95607 845745 54 API calls _wcslen 95358->95607 95361 7d1940 9 API calls 95359->95361 95363 7d1549 95361->95363 95362 7dfddb 22 API calls 95362->95371 95364 8164fa 95363->95364 95367 7d1940 9 API calls 95363->95367 95375 816369 95364->95375 95608 83359c 82 API calls __wsopen_s 95364->95608 95365 7d1872 95365->95336 95603 7dfaeb 23 API calls 95365->95603 95366 7dfe0b 22 API calls 95366->95371 95373 7d1563 95367->95373 95370 7cec40 207 API calls 95370->95371 95371->95351 95371->95355 95371->95356 95371->95362 95371->95366 95371->95370 95372 8163b2 95371->95372 95371->95375 95606 83359c 82 API calls __wsopen_s 95372->95606 95373->95364 95376 7ca8c7 22 API calls 95373->95376 95378 7d15c7 messages 95373->95378 95375->95284 95376->95378 95377 7d1940 9 API calls 95377->95378 95378->95364 95378->95365 95378->95375 95378->95377 95380 7d167b messages 95378->95380 95447 84958b 95378->95447 95450 83f0ec 95378->95450 95459 8383da 95378->95459 95462 83744a 95378->95462 95518 84e204 95378->95518 95554 7c6246 95378->95554 95379 7d171d 95379->95284 95380->95379 95598 7dce17 22 API calls messages 95380->95598 95388->95284 95389->95284 95390->95284 95391->95284 95413 7cec76 messages 95392->95413 95393 7dfddb 22 API calls 95393->95413 95394 7e0242 RtlEnterCriticalSection RtlLeaveCriticalSection RtlLeaveCriticalSection WaitForSingleObjectEx RtlEnterCriticalSection 95394->95413 95396 7cfef7 95401 7ca8c7 22 API calls 95396->95401 95406 7ced9d messages 95396->95406 95398 814600 95403 7ca8c7 22 API calls 95398->95403 95398->95406 95399 814b0b 95921 83359c 82 API calls __wsopen_s 95399->95921 95401->95406 95403->95406 95405 7ca8c7 22 API calls 95405->95413 95406->95284 95407 7cfbe3 95407->95406 95410 814bdc 95407->95410 95415 7cf3ae messages 95407->95415 95408 7ca961 22 API calls 95408->95413 95409 7e00a3 29 API calls pre_c_initialization 95409->95413 95922 83359c 82 API calls __wsopen_s 95410->95922 95412 814beb 95923 83359c 82 API calls __wsopen_s 95412->95923 95413->95393 95413->95394 95413->95396 95413->95398 95413->95399 95413->95405 95413->95406 95413->95407 95413->95408 95413->95409 95413->95412 95414 7e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95413->95414 95413->95415 95918 7d01e0 207 API calls 2 library calls 95413->95918 95919 7d06a0 41 API calls messages 95413->95919 95414->95413 95415->95406 95920 83359c 82 API calls __wsopen_s 95415->95920 95416->95284 95417->95295 95418->95295 95419->95295 95420->95306 95421->95308 95422->95321 95423->95321 95424->95314 95426 7dfe0b 22 API calls 95425->95426 95427 7ca976 95426->95427 95428 7dfddb 22 API calls 95427->95428 95429 7ca984 95428->95429 95430 7e00a3 29 API calls __onexit 95429->95430 95430->95322 95431->95321 95432->95321 95433->95321 95434->95321 95435->95321 95436->95321 95438 7d1981 95437->95438 95443 7d195d 95437->95443 95609 7e0242 5 API calls __Init_thread_wait 95438->95609 95439 7d13a0 95439->95344 95442 7d198b 95442->95443 95610 7e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent 95442->95610 95443->95439 95611 7e0242 5 API calls __Init_thread_wait 95443->95611 95444 7d8727 95444->95439 95612 7e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent 95444->95612 95613 847f59 95447->95613 95449 84959b 95449->95378 95451 7c7510 53 API calls 95450->95451 95452 83f126 95451->95452 95716 7c9e90 95452->95716 95454 83f136 95455 83f15b 95454->95455 95456 7cec40 207 API calls 95454->95456 95458 83f15f 95455->95458 95744 7c9c6e 22 API calls 95455->95744 95456->95455 95458->95378 95765 8398e3 95459->95765 95461 8383ea 95461->95378 95463 837469 95462->95463 95465 837474 95462->95465 95861 7cb567 39 API calls 95463->95861 95466 837554 95465->95466 95468 7ca961 22 API calls 95465->95468 95467 7dfddb 22 API calls 95466->95467 95516 8376a4 95466->95516 95469 837587 95467->95469 95470 837495 95468->95470 95471 7dfe0b 22 API calls 95469->95471 95472 7ca961 22 API calls 95470->95472 95473 837598 95471->95473 95474 83749e 95472->95474 95475 7c6246 CloseHandle 95473->95475 95477 7c7510 53 API calls 95474->95477 95476 8375a3 95475->95476 95478 7ca961 22 API calls 95476->95478 95479 8374aa 95477->95479 95480 8375ab 95478->95480 95862 7c525f 22 API calls 95479->95862 95482 7c6246 CloseHandle 95480->95482 95484 8375b2 95482->95484 95483 8374bf 95485 7c6350 22 API calls 95483->95485 95487 7c7510 53 API calls 95484->95487 95486 8374f2 95485->95486 95488 83754a 95486->95488 95863 82d4ce lstrlenW GetFileAttributesW FindFirstFileW FindClose 95486->95863 95489 8375be 95487->95489 95865 7cb567 39 API calls 95488->95865 95491 7c6246 CloseHandle 95489->95491 95494 8375c8 95491->95494 95493 837502 95493->95488 95495 837506 95493->95495 95497 7c5745 5 API calls 95494->95497 95496 7c9cb3 22 API calls 95495->95496 95498 837513 95496->95498 95499 8375e2 95497->95499 95864 82d2c1 26 API calls 95498->95864 95501 8375ea 95499->95501 95502 8376de GetLastError 95499->95502 95866 7c53de 27 API calls messages 95501->95866 95503 8376f7 95502->95503 95869 7c6216 CloseHandle messages 95503->95869 95506 8375f8 95867 7c53c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 95506->95867 95507 83751c 95507->95488 95509 837645 95510 7dfddb 22 API calls 95509->95510 95512 837679 95510->95512 95511 8375ff 95511->95509 95514 82ccff 4 API calls 95511->95514 95513 7ca961 22 API calls 95512->95513 95515 837686 95513->95515 95514->95509 95515->95516 95868 82417d 22 API calls __fread_nolock 95515->95868 95516->95378 95519 7ca961 22 API calls 95518->95519 95520 84e21b 95519->95520 95521 7c7510 53 API calls 95520->95521 95522 84e22a 95521->95522 95523 7c6270 22 API calls 95522->95523 95524 84e23d 95523->95524 95525 7c7510 53 API calls 95524->95525 95526 84e24a 95525->95526 95527 84e2c7 95526->95527 95528 84e262 95526->95528 95530 7c7510 53 API calls 95527->95530 95889 7cb567 39 API calls 95528->95889 95532 84e2cc 95530->95532 95531 84e267 95534 84e2d9 95531->95534 95536 84e280 95531->95536 95533 84e314 95532->95533 95532->95534 95537 84e32c 95533->95537 95893 7cb567 39 API calls 95533->95893 95892 7c9c6e 22 API calls 95534->95892 95890 7c6d25 22 API calls __fread_nolock 95536->95890 95540 84e345 95537->95540 95894 7cb567 39 API calls 95537->95894 95541 7ca8c7 22 API calls 95540->95541 95544 84e35f 95541->95544 95542 84e28d 95545 7c6350 22 API calls 95542->95545 95870 8292c8 95544->95870 95547 84e29b 95545->95547 95891 7c6d25 22 API calls __fread_nolock 95547->95891 95549 84e2b4 95550 7c6350 22 API calls 95549->95550 95553 84e2c2 95550->95553 95551 84e2e6 95551->95378 95895 7c62b5 22 API calls 95553->95895 95555 7c625f 95554->95555 95556 7c6250 95554->95556 95555->95556 95557 7c6264 CloseHandle 95555->95557 95556->95378 95557->95556 95559 8470f5 95558->95559 95560 8470db 95558->95560 95899 845689 95559->95899 95910 83359c 82 API calls __wsopen_s 95560->95910 95564 7cec40 206 API calls 95565 847164 95564->95565 95566 8471ff 95565->95566 95569 8471a6 95565->95569 95591 8470ed 95565->95591 95567 847205 95566->95567 95568 847253 95566->95568 95911 831119 22 API calls 95567->95911 95570 7c7510 53 API calls 95568->95570 95568->95591 95575 830acc 22 API calls 95569->95575 95572 847265 95570->95572 95573 7caec9 22 API calls 95572->95573 95576 847289 CharUpperBuffW 95573->95576 95574 847228 95912 7ca673 22 API calls 95574->95912 95578 8471de 95575->95578 95581 8472a3 95576->95581 95580 7d1310 206 API calls 95578->95580 95579 847230 95913 7cbf40 207 API calls 2 library calls 95579->95913 95580->95591 95582 8472f6 95581->95582 95583 8472aa 95581->95583 95585 7c7510 53 API calls 95582->95585 95906 830acc 95583->95906 95586 8472fe 95585->95586 95914 7de300 23 API calls 95586->95914 95590 7d1310 206 API calls 95590->95591 95591->95341 95592 847308 95592->95591 95593 7c7510 53 API calls 95592->95593 95594 847323 95593->95594 95915 7ca673 22 API calls 95594->95915 95596 847333 95916 7cbf40 207 API calls 2 library calls 95596->95916 95598->95380 95599->95337 95600->95340 95601->95351 95602->95365 95603->95365 95604->95375 95605->95375 95606->95375 95607->95373 95608->95375 95609->95442 95610->95443 95611->95444 95612->95439 95614 7c7510 53 API calls 95613->95614 95615 847f90 95614->95615 95620 847fd5 messages 95615->95620 95651 848cd3 95615->95651 95617 84844f 95692 848ee4 60 API calls 95617->95692 95620->95449 95621 84845e 95623 84828f 95621->95623 95624 84846a 95621->95624 95622 848049 95622->95620 95625 7c7510 53 API calls 95622->95625 95638 848281 95622->95638 95683 82417d 22 API calls __fread_nolock 95622->95683 95684 84851d 42 API calls _strftime 95622->95684 95664 847e86 95623->95664 95624->95620 95625->95622 95630 8482c8 95679 7dfc70 95630->95679 95633 848302 95686 7c63eb 22 API calls 95633->95686 95634 8482e8 95685 83359c 82 API calls __wsopen_s 95634->95685 95637 848311 95687 7c6a50 22 API calls 95637->95687 95638->95617 95638->95623 95639 8482f3 GetCurrentProcess TerminateProcess 95639->95633 95641 84832a 95649 848352 95641->95649 95688 7d04f0 22 API calls 95641->95688 95643 8484c5 95643->95620 95645 8484d9 FreeLibrary 95643->95645 95644 848341 95689 848b7b 75 API calls 95644->95689 95645->95620 95649->95643 95690 7d04f0 22 API calls 95649->95690 95691 7caceb 23 API calls messages 95649->95691 95693 848b7b 75 API calls 95649->95693 95694 7caec9 95651->95694 95653 848cee CharLowerBuffW 95700 828e54 95653->95700 95657 7ca961 22 API calls 95658 848d2a 95657->95658 95707 7c6d25 22 API calls __fread_nolock 95658->95707 95660 848d3e 95708 7c93b2 95660->95708 95662 848e5e _wcslen 95662->95622 95663 848d48 _wcslen 95663->95662 95712 84851d 42 API calls _strftime 95663->95712 95665 847ea1 95664->95665 95669 847eec 95664->95669 95666 7dfe0b 22 API calls 95665->95666 95667 847ec3 95666->95667 95668 7dfddb 22 API calls 95667->95668 95667->95669 95668->95667 95670 849096 95669->95670 95671 8492ab messages 95670->95671 95675 8490ba _strcat _wcslen 95670->95675 95671->95630 95672 7cb567 39 API calls 95672->95675 95673 7cb38f 39 API calls 95673->95675 95674 7cb6b5 39 API calls 95674->95675 95675->95671 95675->95672 95675->95673 95675->95674 95676 7c7510 53 API calls 95675->95676 95677 7eea0c 21 API calls ___std_exception_copy 95675->95677 95715 82efae 24 API calls _wcslen 95675->95715 95676->95675 95677->95675 95681 7dfc85 95679->95681 95680 7dfd1d VirtualProtect 95682 7dfceb 95680->95682 95681->95680 95681->95682 95682->95633 95682->95634 95683->95622 95684->95622 95685->95639 95686->95637 95687->95641 95688->95644 95689->95649 95690->95649 95691->95649 95692->95621 95693->95649 95695 7caedc 95694->95695 95699 7caed9 __fread_nolock 95694->95699 95696 7dfddb 22 API calls 95695->95696 95697 7caee7 95696->95697 95698 7dfe0b 22 API calls 95697->95698 95698->95699 95699->95653 95701 828e74 _wcslen 95700->95701 95702 828f63 95701->95702 95704 828ea9 95701->95704 95706 828f68 95701->95706 95702->95657 95702->95663 95704->95702 95713 7dce60 41 API calls 95704->95713 95706->95702 95714 7dce60 41 API calls 95706->95714 95707->95660 95709 7c93c0 95708->95709 95711 7c93c9 __fread_nolock 95708->95711 95710 7caec9 22 API calls 95709->95710 95709->95711 95710->95711 95711->95663 95712->95662 95713->95704 95714->95706 95715->95675 95745 7c6270 95716->95745 95718 7c9fd2 95751 7ca4a1 95718->95751 95720 7c9eb5 95720->95718 95724 80f7c4 95720->95724 95725 80f699 95720->95725 95726 7ca405 95720->95726 95730 7ca6c3 22 API calls 95720->95730 95738 7ca12c __fread_nolock 95720->95738 95739 7ca587 22 API calls 95720->95739 95740 7caec9 22 API calls 95720->95740 95743 7ca4a1 22 API calls 95720->95743 95750 7c4573 41 API calls _wcslen 95720->95750 95760 7c48c8 23 API calls 95720->95760 95761 7c49bd 22 API calls __fread_nolock 95720->95761 95762 7ca673 22 API calls 95720->95762 95721 7c9fec 95721->95454 95763 8296e2 84 API calls __wsopen_s 95724->95763 95731 7dfddb 22 API calls 95725->95731 95726->95721 95764 8296e2 84 API calls __wsopen_s 95726->95764 95730->95720 95733 80f754 95731->95733 95732 80f7d2 95734 7ca4a1 22 API calls 95732->95734 95736 7dfe0b 22 API calls 95733->95736 95735 80f7e8 95734->95735 95735->95721 95736->95738 95738->95724 95738->95726 95739->95720 95741 7ca0db CharUpperBuffW 95740->95741 95759 7ca673 22 API calls 95741->95759 95743->95720 95744->95458 95746 7dfe0b 22 API calls 95745->95746 95747 7c6295 95746->95747 95748 7dfddb 22 API calls 95747->95748 95749 7c62a3 95748->95749 95749->95720 95750->95720 95752 7ca52b 95751->95752 95753 7ca4b1 __fread_nolock 95751->95753 95755 7dfe0b 22 API calls 95752->95755 95754 7dfddb 22 API calls 95753->95754 95756 7ca4b8 95754->95756 95755->95753 95757 7dfddb 22 API calls 95756->95757 95758 7ca4d6 95756->95758 95757->95758 95758->95721 95759->95720 95760->95720 95761->95720 95762->95720 95763->95732 95764->95721 95766 839902 95765->95766 95767 8399e8 95765->95767 95769 7dfddb 22 API calls 95766->95769 95835 839caa 39 API calls 95767->95835 95770 839909 95769->95770 95771 7dfe0b 22 API calls 95770->95771 95772 83991a 95771->95772 95775 7c6246 CloseHandle 95772->95775 95773 839ac5 95816 831e96 95773->95816 95774 8399a2 95774->95773 95776 8399ca 95774->95776 95782 839a33 95774->95782 95778 839925 95775->95778 95776->95461 95779 7ca961 22 API calls 95778->95779 95781 83992d 95779->95781 95780 839acc 95820 82ccff 95780->95820 95783 7c6246 CloseHandle 95781->95783 95784 7c7510 53 API calls 95782->95784 95785 839934 95783->95785 95794 839a3a 95784->95794 95787 7c7510 53 API calls 95785->95787 95790 839940 95787->95790 95788 839abb 95846 82cd57 30 API calls 95788->95846 95792 7c6246 CloseHandle 95790->95792 95791 839a6e 95793 7c6270 22 API calls 95791->95793 95796 83994a 95792->95796 95797 839a7e 95793->95797 95794->95788 95794->95791 95795 7c6246 CloseHandle 95798 839b1e 95795->95798 95824 7c5745 95796->95824 95800 839a8e 95797->95800 95803 7ca8c7 22 API calls 95797->95803 95847 7c6216 CloseHandle messages 95798->95847 95836 7c33c6 95800->95836 95803->95800 95805 8399c2 95834 7c6216 CloseHandle messages 95805->95834 95806 83995d 95832 7c53de 27 API calls messages 95806->95832 95810 839aa8 95810->95776 95810->95795 95812 83996b 95833 7c53c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 95812->95833 95814 839972 95814->95774 95815 82ccff 4 API calls 95814->95815 95815->95774 95817 831ea4 95816->95817 95818 831e9f 95816->95818 95817->95780 95848 830f67 24 API calls __fread_nolock 95818->95848 95821 82cd19 WriteFile 95820->95821 95822 82cd0e 95820->95822 95821->95810 95849 82cc37 SetFilePointerEx SetFilePointerEx SetFilePointerEx 95822->95849 95825 7c575c CreateFileW 95824->95825 95826 804035 95824->95826 95827 7c577b 95825->95827 95826->95827 95828 80403b CreateFileW 95826->95828 95827->95805 95827->95806 95828->95827 95829 804063 95828->95829 95850 7c54c6 SetFilePointerEx SetFilePointerEx SetFilePointerEx 95829->95850 95831 80406e 95831->95827 95832->95812 95833->95814 95834->95776 95835->95774 95837 7c33dd 95836->95837 95838 8030bb 95836->95838 95851 7c33ee 95837->95851 95840 7dfddb 22 API calls 95838->95840 95842 8030c5 _wcslen 95840->95842 95841 7c33e8 95845 82cd57 30 API calls 95841->95845 95843 7dfe0b 22 API calls 95842->95843 95844 8030fe __fread_nolock 95843->95844 95845->95810 95846->95810 95847->95776 95848->95817 95849->95821 95850->95831 95852 7c33fe _wcslen 95851->95852 95853 80311d 95852->95853 95854 7c3411 95852->95854 95855 7dfddb 22 API calls 95853->95855 95856 7ca587 22 API calls 95854->95856 95857 803127 95855->95857 95858 7c341e __fread_nolock 95856->95858 95859 7dfe0b 22 API calls 95857->95859 95858->95841 95860 803157 __fread_nolock 95859->95860 95861->95465 95862->95483 95863->95493 95864->95507 95865->95466 95866->95506 95867->95511 95868->95516 95869->95516 95871 7ca961 22 API calls 95870->95871 95872 8292de 95871->95872 95873 7c6270 22 API calls 95872->95873 95874 8292f2 95873->95874 95875 828e54 41 API calls 95874->95875 95881 829314 95874->95881 95877 82930e 95875->95877 95876 828e54 41 API calls 95876->95881 95877->95881 95896 7c6d25 22 API calls __fread_nolock 95877->95896 95880 7c6350 22 API calls 95880->95881 95881->95876 95881->95880 95882 8293b3 95881->95882 95885 829397 95881->95885 95897 7c6d25 22 API calls __fread_nolock 95881->95897 95883 7ca8c7 22 API calls 95882->95883 95884 8293c2 95882->95884 95883->95884 95884->95553 95898 7c6d25 22 API calls __fread_nolock 95885->95898 95887 8293a7 95888 7c6350 22 API calls 95887->95888 95888->95882 95889->95531 95890->95542 95891->95549 95892->95551 95893->95537 95894->95540 95895->95551 95896->95881 95897->95881 95898->95887 95900 8456a4 95899->95900 95905 8456f2 95899->95905 95901 7dfe0b 22 API calls 95900->95901 95904 8456c6 95901->95904 95902 7dfddb 22 API calls 95902->95904 95904->95902 95904->95905 95917 830a59 22 API calls 95904->95917 95905->95564 95907 830b13 95906->95907 95908 830ada 95906->95908 95907->95590 95908->95907 95909 7dfddb 22 API calls 95908->95909 95909->95907 95910->95591 95911->95574 95912->95579 95913->95591 95914->95592 95915->95596 95916->95591 95917->95904 95918->95413 95919->95413 95920->95406 95921->95406 95922->95412 95923->95406 95924 7cf7bf 95925 7cfcb6 95924->95925 95926 7cf7d3 95924->95926 95961 7caceb 23 API calls messages 95925->95961 95928 7cfcc2 95926->95928 95929 7dfddb 22 API calls 95926->95929 95962 7caceb 23 API calls messages 95928->95962 95931 7cf7e5 95929->95931 95931->95928 95932 7cf83e 95931->95932 95933 7cfd3d 95931->95933 95935 7d1310 207 API calls 95932->95935 95958 7ced9d messages 95932->95958 95963 831155 22 API calls 95933->95963 95956 7cec76 messages 95935->95956 95937 7dfddb 22 API calls 95937->95956 95938 7cfef7 95943 7ca8c7 22 API calls 95938->95943 95938->95958 95940 814600 95945 7ca8c7 22 API calls 95940->95945 95940->95958 95941 814b0b 95965 83359c 82 API calls __wsopen_s 95941->95965 95943->95958 95945->95958 95947 7e0242 RtlEnterCriticalSection RtlLeaveCriticalSection RtlLeaveCriticalSection WaitForSingleObjectEx RtlEnterCriticalSection 95947->95956 95948 7ca8c7 22 API calls 95948->95956 95949 7cfbe3 95951 814bdc 95949->95951 95957 7cf3ae messages 95949->95957 95949->95958 95950 7ca961 22 API calls 95950->95956 95966 83359c 82 API calls __wsopen_s 95951->95966 95953 7e00a3 29 API calls pre_c_initialization 95953->95956 95954 814beb 95967 83359c 82 API calls __wsopen_s 95954->95967 95955 7e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95955->95956 95956->95937 95956->95938 95956->95940 95956->95941 95956->95947 95956->95948 95956->95949 95956->95950 95956->95953 95956->95954 95956->95955 95956->95957 95956->95958 95959 7d01e0 207 API calls 2 library calls 95956->95959 95960 7d06a0 41 API calls messages 95956->95960 95957->95958 95964 83359c 82 API calls __wsopen_s 95957->95964 95959->95956 95960->95956 95961->95928 95962->95933 95963->95958 95964->95958 95965->95958 95966->95954 95967->95958 95968 7c1098 95973 7c42de 95968->95973 95972 7c10a7 95974 7ca961 22 API calls 95973->95974 95975 7c42f5 GetVersionExW 95974->95975 95994 7c6b57 95975->95994 95977 7c4342 95978 7c93b2 22 API calls 95977->95978 95982 7c4378 95977->95982 95979 7c436c 95978->95979 96006 7c37a0 95979->96006 95980 7c441b GetCurrentProcess IsWow64Process 95983 7c4437 95980->95983 95982->95980 95989 8037df 95982->95989 95984 7c444f LoadLibraryA 95983->95984 95985 803824 GetSystemInfo 95983->95985 95986 7c449c GetSystemInfo 95984->95986 95987 7c4460 GetProcAddress 95984->95987 95988 7c4476 95986->95988 95987->95986 95990 7c4470 GetNativeSystemInfo 95987->95990 95991 7c447a FreeLibrary 95988->95991 95992 7c109d 95988->95992 95990->95988 95991->95992 95993 7e00a3 29 API calls __onexit 95992->95993 95993->95972 95995 804ba1 95994->95995 95996 7c6b67 _wcslen 95994->95996 95997 7c93b2 22 API calls 95995->95997 95999 7c6b7d 95996->95999 96000 7c6ba2 95996->96000 95998 804baa 95997->95998 95998->95998 96010 7c6f34 22 API calls 95999->96010 96001 7dfddb 22 API calls 96000->96001 96003 7c6bae 96001->96003 96005 7dfe0b 22 API calls 96003->96005 96004 7c6b85 __fread_nolock 96004->95977 96005->96004 96007 7c37ae 96006->96007 96008 7c93b2 22 API calls 96007->96008 96009 7c37c2 96008->96009 96009->95982 96010->96004 96011 802ba5 96012 7c2b25 96011->96012 96013 802baf 96011->96013 96039 7c2b83 7 API calls 96012->96039 96054 7c3a5a 96013->96054 96017 802bb8 96019 7c9cb3 22 API calls 96017->96019 96021 802bc6 96019->96021 96020 7c2b2f 96030 7c2b44 96020->96030 96043 7c3837 96020->96043 96022 802bf5 96021->96022 96023 802bce 96021->96023 96024 7c33c6 22 API calls 96022->96024 96026 7c33c6 22 API calls 96023->96026 96028 802bf1 GetForegroundWindow ShellExecuteW 96024->96028 96027 802bd9 96026->96027 96031 7c6350 22 API calls 96027->96031 96035 802c26 96028->96035 96029 7c2b5f 96037 7c2b66 SetCurrentDirectoryW 96029->96037 96030->96029 96053 7c30f2 Shell_NotifyIconW ___scrt_fastfail 96030->96053 96034 802be7 96031->96034 96036 7c33c6 22 API calls 96034->96036 96035->96029 96036->96028 96038 7c2b7a 96037->96038 96061 7c2cd4 GetSysColorBrush RegisterClassExW RegisterClipboardFormatW 96039->96061 96042 7c2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96042->96020 96044 7c3862 ___scrt_fastfail 96043->96044 96065 7c4212 96044->96065 96047 7c38e8 96049 803386 Shell_NotifyIconW 96047->96049 96050 7c3906 Shell_NotifyIconW 96047->96050 96069 7c3923 96050->96069 96052 7c391c 96052->96030 96053->96029 96092 801f50 96054->96092 96057 7c9cb3 22 API calls 96058 7c3a8d 96057->96058 96094 7c3aa2 96058->96094 96060 7c3a97 96060->96017 96062 7c2d65 LoadIconW 96061->96062 96064 7c2b2a 96062->96064 96064->96042 96066 8035a4 96065->96066 96067 7c38b7 96065->96067 96066->96067 96068 8035ad DestroyCursor 96066->96068 96067->96047 96091 82c874 42 API calls _strftime 96067->96091 96068->96067 96070 7c393f 96069->96070 96071 7c3a13 96069->96071 96072 7c6270 22 API calls 96070->96072 96071->96052 96073 7c394d 96072->96073 96074 803393 LoadStringW 96073->96074 96075 7c395a 96073->96075 96078 8033ad 96074->96078 96076 7c6b57 22 API calls 96075->96076 96077 7c396f 96076->96077 96079 7c397c 96077->96079 96080 8033c9 96077->96080 96081 7ca8c7 22 API calls 96078->96081 96085 7c3994 ___scrt_fastfail 96078->96085 96079->96078 96082 7c3986 96079->96082 96083 7c6350 22 API calls 96080->96083 96081->96085 96084 7c6350 22 API calls 96082->96084 96086 8033d7 96083->96086 96084->96085 96088 7c39f9 Shell_NotifyIconW 96085->96088 96086->96085 96087 7c33c6 22 API calls 96086->96087 96089 8033f9 96087->96089 96088->96071 96090 7c33c6 22 API calls 96089->96090 96090->96085 96091->96047 96093 7c3a67 GetModuleFileNameW 96092->96093 96093->96057 96095 801f50 __wsopen_s 96094->96095 96096 7c3aaf GetFullPathNameW 96095->96096 96097 7c3ace 96096->96097 96098 7c3ae9 96096->96098 96099 7c6b57 22 API calls 96097->96099 96104 7ca6c3 96098->96104 96101 7c3ada 96099->96101 96102 7c37a0 22 API calls 96101->96102 96103 7c3ae6 96102->96103 96103->96060 96105 7ca6dd 96104->96105 96109 7ca6d0 96104->96109 96106 7dfddb 22 API calls 96105->96106 96107 7ca6e7 96106->96107 96108 7dfe0b 22 API calls 96107->96108 96108->96109 96109->96101 96110 7e03fb 96111 7e0407 BuildCatchObjectHelperInternal 96110->96111 96141 7dfeb1 96111->96141 96113 7e040e 96114 7e0561 96113->96114 96117 7e0438 96113->96117 96168 7e083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96114->96168 96116 7e0568 96169 7e4e52 28 API calls _abort 96116->96169 96130 7e0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96117->96130 96152 7f247d 96117->96152 96119 7e056e 96170 7e4e04 28 API calls _abort 96119->96170 96123 7e0576 96171 7e0aea GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 96123->96171 96124 7e0457 96127 7e057c __scrt_common_main_seh 96128 7e04d8 96160 7e0959 96128->96160 96130->96128 96164 7e4e1a 38 API calls 3 library calls 96130->96164 96132 7e04de 96133 7e04f3 96132->96133 96165 7e0992 GetModuleHandleW 96133->96165 96135 7e04fa 96135->96116 96136 7e04fe 96135->96136 96137 7e0507 96136->96137 96166 7e4df5 28 API calls _abort 96136->96166 96167 7e0040 13 API calls 2 library calls 96137->96167 96140 7e050f 96140->96124 96142 7dfeba 96141->96142 96172 7e0698 IsProcessorFeaturePresent 96142->96172 96144 7dfec6 96173 7e2c94 10 API calls 3 library calls 96144->96173 96146 7dfecb 96147 7dfecf 96146->96147 96174 7f2317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96146->96174 96147->96113 96149 7dfed8 96150 7dfee6 96149->96150 96175 7e2cbd 8 API calls 3 library calls 96149->96175 96150->96113 96153 7f2494 96152->96153 96176 7e0a8c 96153->96176 96155 7e0451 96155->96124 96156 7f2421 96155->96156 96157 7f2450 96156->96157 96158 7e0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 96157->96158 96159 7f2479 96158->96159 96159->96130 96184 7e2340 96160->96184 96163 7e097f 96163->96132 96164->96128 96165->96135 96166->96137 96167->96140 96168->96116 96169->96119 96170->96123 96171->96127 96172->96144 96173->96146 96174->96149 96175->96147 96177 7e0a97 IsProcessorFeaturePresent 96176->96177 96178 7e0a95 96176->96178 96180 7e0c5d 96177->96180 96178->96155 96183 7e0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96180->96183 96182 7e0d40 96182->96155 96183->96182 96185 7e096c GetStartupInfoW 96184->96185 96185->96163 96186 7c1056 96191 7c344d 96186->96191 96188 7c106a 96222 7e00a3 29 API calls __onexit 96188->96222 96190 7c1074 96192 7c345d __wsopen_s 96191->96192 96193 7ca961 22 API calls 96192->96193 96194 7c3513 96193->96194 96195 7c3a5a 24 API calls 96194->96195 96196 7c351c 96195->96196 96223 7c3357 96196->96223 96199 7c33c6 22 API calls 96200 7c3535 96199->96200 96229 7c515f 96200->96229 96203 7ca961 22 API calls 96204 7c354d 96203->96204 96205 7ca6c3 22 API calls 96204->96205 96206 7c3556 RegOpenKeyExW 96205->96206 96207 803176 RegQueryValueExW 96206->96207 96212 7c3578 96206->96212 96208 803193 96207->96208 96209 80320c RegCloseKey 96207->96209 96210 7dfe0b 22 API calls 96208->96210 96209->96212 96221 80321e _wcslen 96209->96221 96211 8031ac 96210->96211 96235 7c5722 96211->96235 96212->96188 96215 8031d4 96216 7c6b57 22 API calls 96215->96216 96218 8031ee messages 96216->96218 96217 7c4c6d 22 API calls 96217->96221 96218->96209 96219 7c9cb3 22 API calls 96219->96221 96220 7c515f 22 API calls 96220->96221 96221->96212 96221->96217 96221->96219 96221->96220 96222->96190 96224 801f50 __wsopen_s 96223->96224 96225 7c3364 GetFullPathNameW 96224->96225 96226 7c3386 96225->96226 96227 7c6b57 22 API calls 96226->96227 96228 7c33a4 96227->96228 96228->96199 96230 7c516e 96229->96230 96234 7c518f __fread_nolock 96229->96234 96232 7dfe0b 22 API calls 96230->96232 96231 7dfddb 22 API calls 96233 7c3544 96231->96233 96232->96234 96233->96203 96234->96231 96236 7dfddb 22 API calls 96235->96236 96237 7c5734 RegQueryValueExW 96236->96237 96237->96215 96237->96218 96238 7c3156 96241 7c3170 96238->96241 96242 7c3187 96241->96242 96243 7c318c 96242->96243 96244 7c31eb 96242->96244 96281 7c31e9 96242->96281 96248 7c3199 96243->96248 96249 7c3265 PostQuitMessage 96243->96249 96246 802dfb 96244->96246 96247 7c31f1 96244->96247 96245 7c31d0 NtdllDefWindowProc_W 96282 7c316a 96245->96282 96290 7c18e2 10 API calls 96246->96290 96250 7c321d SetTimer RegisterClipboardFormatW 96247->96250 96251 7c31f8 96247->96251 96253 7c31a4 96248->96253 96254 802e7c 96248->96254 96249->96282 96258 7c3246 CreatePopupMenu 96250->96258 96250->96282 96255 802d9c 96251->96255 96256 7c3201 KillTimer 96251->96256 96259 7c31ae 96253->96259 96260 802e68 96253->96260 96295 82bf30 34 API calls ___scrt_fastfail 96254->96295 96262 802da1 96255->96262 96263 802dd7 MoveWindow 96255->96263 96286 7c30f2 Shell_NotifyIconW ___scrt_fastfail 96256->96286 96257 802e1c 96291 7de499 42 API calls 96257->96291 96258->96282 96267 7c31b9 96259->96267 96268 802e4d 96259->96268 96294 82c161 27 API calls ___scrt_fastfail 96260->96294 96270 802dc6 SetFocus 96262->96270 96271 802da7 96262->96271 96263->96282 96274 7c31c4 96267->96274 96275 7c3253 96267->96275 96268->96245 96293 820ad7 22 API calls 96268->96293 96269 802e8e 96269->96245 96269->96282 96270->96282 96271->96274 96276 802db0 96271->96276 96272 7c3214 96287 7c3c50 DeleteObject DestroyWindow 96272->96287 96273 7c3263 96273->96282 96274->96245 96292 7c30f2 Shell_NotifyIconW ___scrt_fastfail 96274->96292 96288 7c326f 44 API calls ___scrt_fastfail 96275->96288 96289 7c18e2 10 API calls 96276->96289 96281->96245 96284 802e41 96285 7c3837 49 API calls 96284->96285 96285->96281 96286->96272 96287->96282 96288->96273 96289->96282 96290->96257 96291->96274 96292->96284 96293->96281 96294->96273 96295->96269 96296 7c2e37 96297 7ca961 22 API calls 96296->96297 96298 7c2e4d 96297->96298 96375 7c4ae3 96298->96375 96300 7c2e6b 96301 7c3a5a 24 API calls 96300->96301 96302 7c2e7f 96301->96302 96303 7c9cb3 22 API calls 96302->96303 96304 7c2e8c 96303->96304 96389 7c4ecb 96304->96389 96307 802cb0 96427 832cf9 96307->96427 96308 7c2ead 96311 7ca8c7 22 API calls 96308->96311 96310 802cc3 96312 802ccf 96310->96312 96453 7c4f39 96310->96453 96313 7c2ec3 96311->96313 96316 7c4f39 68 API calls 96312->96316 96411 7c6f88 22 API calls 96313->96411 96318 802ce5 96316->96318 96317 7c2ecf 96319 7c9cb3 22 API calls 96317->96319 96459 7c3084 22 API calls 96318->96459 96320 7c2edc 96319->96320 96412 7ca81b 41 API calls 96320->96412 96323 7c2eec 96325 7c9cb3 22 API calls 96323->96325 96324 802d02 96460 7c3084 22 API calls 96324->96460 96326 7c2f12 96325->96326 96413 7ca81b 41 API calls 96326->96413 96329 802d1e 96330 7c3a5a 24 API calls 96329->96330 96331 802d44 96330->96331 96461 7c3084 22 API calls 96331->96461 96332 7c2f21 96335 7ca961 22 API calls 96332->96335 96334 802d50 96336 7ca8c7 22 API calls 96334->96336 96337 7c2f3f 96335->96337 96338 802d5e 96336->96338 96414 7c3084 22 API calls 96337->96414 96462 7c3084 22 API calls 96338->96462 96341 7c2f4b 96415 7e4a28 40 API calls 3 library calls 96341->96415 96342 802d6d 96346 7ca8c7 22 API calls 96342->96346 96344 7c2f59 96344->96318 96345 7c2f63 96344->96345 96416 7e4a28 40 API calls 3 library calls 96345->96416 96349 802d83 96346->96349 96348 7c2f6e 96348->96324 96350 7c2f78 96348->96350 96463 7c3084 22 API calls 96349->96463 96417 7e4a28 40 API calls 3 library calls 96350->96417 96353 802d90 96354 7c2f83 96354->96329 96355 7c2f8d 96354->96355 96418 7e4a28 40 API calls 3 library calls 96355->96418 96357 7c2f98 96358 7c2fdc 96357->96358 96419 7c3084 22 API calls 96357->96419 96358->96342 96359 7c2fe8 96358->96359 96359->96353 96421 7c63eb 22 API calls 96359->96421 96362 7c2fbf 96364 7ca8c7 22 API calls 96362->96364 96363 7c2ff8 96422 7c6a50 22 API calls 96363->96422 96366 7c2fcd 96364->96366 96420 7c3084 22 API calls 96366->96420 96367 7c3006 96423 7c70b0 23 API calls 96367->96423 96372 7c3021 96373 7c3065 96372->96373 96424 7c6f88 22 API calls 96372->96424 96425 7c70b0 23 API calls 96372->96425 96426 7c3084 22 API calls 96372->96426 96376 7c4af0 __wsopen_s 96375->96376 96377 7c6b57 22 API calls 96376->96377 96378 7c4b22 96376->96378 96377->96378 96388 7c4b58 96378->96388 96464 7c4c6d 96378->96464 96380 7c4c29 96381 7c4c5e 96380->96381 96382 7c9cb3 22 API calls 96380->96382 96381->96300 96383 7c4c52 96382->96383 96385 7c515f 22 API calls 96383->96385 96384 7c9cb3 22 API calls 96384->96388 96385->96381 96386 7c4c6d 22 API calls 96386->96388 96387 7c515f 22 API calls 96387->96388 96388->96380 96388->96384 96388->96386 96388->96387 96467 7c4e90 LoadLibraryA 96389->96467 96394 7c4ef6 LoadLibraryExW 96475 7c4e59 LoadLibraryA 96394->96475 96395 803ccf 96396 7c4f39 68 API calls 96395->96396 96398 803cd6 96396->96398 96400 7c4e59 3 API calls 96398->96400 96402 803cde 96400->96402 96497 7c50f5 96402->96497 96403 7c4f20 96403->96402 96404 7c4f2c 96403->96404 96406 7c4f39 68 API calls 96404->96406 96408 7c2ea5 96406->96408 96408->96307 96408->96308 96410 803d05 96411->96317 96412->96323 96413->96332 96414->96341 96415->96344 96416->96348 96417->96354 96418->96357 96419->96362 96420->96358 96421->96363 96422->96367 96423->96372 96424->96372 96425->96372 96426->96372 96428 832d15 96427->96428 96429 7c511f 64 API calls 96428->96429 96430 832d29 96429->96430 96636 832e66 96430->96636 96433 832d3f 96433->96310 96434 7c50f5 40 API calls 96435 832d56 96434->96435 96436 7c50f5 40 API calls 96435->96436 96437 832d66 96436->96437 96438 7c50f5 40 API calls 96437->96438 96439 832d81 96438->96439 96440 7c50f5 40 API calls 96439->96440 96441 832d9c 96440->96441 96442 7c511f 64 API calls 96441->96442 96443 832db3 96442->96443 96444 7eea0c ___std_exception_copy 21 API calls 96443->96444 96445 832dba 96444->96445 96446 7eea0c ___std_exception_copy 21 API calls 96445->96446 96447 832dc4 96446->96447 96448 7c50f5 40 API calls 96447->96448 96449 832dd8 96448->96449 96450 8328fe 27 API calls 96449->96450 96451 832dee 96450->96451 96451->96433 96642 8322ce 79 API calls 96451->96642 96454 7c4f4a 96453->96454 96455 7c4f43 96453->96455 96457 7c4f59 96454->96457 96458 7c4f6a FreeLibrary 96454->96458 96643 7ee678 96455->96643 96457->96312 96458->96457 96459->96324 96460->96329 96461->96334 96462->96342 96463->96353 96465 7caec9 22 API calls 96464->96465 96466 7c4c78 96465->96466 96466->96378 96468 7c4ea8 GetProcAddress 96467->96468 96469 7c4ec6 96467->96469 96470 7c4eb8 96468->96470 96472 7ee5eb 96469->96472 96470->96469 96471 7c4ebf FreeLibrary 96470->96471 96471->96469 96505 7ee52a 96472->96505 96474 7c4eea 96474->96394 96474->96395 96476 7c4e8d 96475->96476 96477 7c4e6e GetProcAddress 96475->96477 96480 7c4f80 96476->96480 96478 7c4e7e 96477->96478 96478->96476 96479 7c4e86 FreeLibrary 96478->96479 96479->96476 96481 7dfe0b 22 API calls 96480->96481 96482 7c4f95 96481->96482 96483 7c5722 22 API calls 96482->96483 96484 7c4fa1 __fread_nolock 96483->96484 96485 7c4fdc 96484->96485 96486 7c50a5 96484->96486 96487 803d1d 96484->96487 96490 803d22 96485->96490 96491 7c50f5 40 API calls 96485->96491 96496 7c506e messages 96485->96496 96571 7c511f 96485->96571 96565 7c42a2 CreateStreamOnHGlobal 96486->96565 96576 83304d 74 API calls 96487->96576 96492 7c511f 64 API calls 96490->96492 96491->96485 96493 803d45 96492->96493 96494 7c50f5 40 API calls 96493->96494 96494->96496 96496->96403 96498 7c5107 96497->96498 96501 803d70 96497->96501 96598 7ee8c4 96498->96598 96502 8328fe 96619 83274e 96502->96619 96504 832919 96504->96410 96508 7ee536 BuildCatchObjectHelperInternal 96505->96508 96506 7ee544 96530 7ef2d9 20 API calls __dosmaperr 96506->96530 96508->96506 96510 7ee574 96508->96510 96509 7ee549 96531 7f27ec 26 API calls pre_c_initialization 96509->96531 96512 7ee579 96510->96512 96513 7ee586 96510->96513 96532 7ef2d9 20 API calls __dosmaperr 96512->96532 96522 7f8061 96513->96522 96516 7ee58f 96517 7ee595 96516->96517 96518 7ee5a2 96516->96518 96533 7ef2d9 20 API calls __dosmaperr 96517->96533 96534 7ee5d4 RtlLeaveCriticalSection __fread_nolock 96518->96534 96519 7ee554 __fread_nolock 96519->96474 96523 7f806d BuildCatchObjectHelperInternal 96522->96523 96535 7f2f5e RtlEnterCriticalSection 96523->96535 96525 7f807b 96536 7f80fb 96525->96536 96529 7f80ac __fread_nolock 96529->96516 96530->96509 96531->96519 96532->96519 96533->96519 96534->96519 96535->96525 96543 7f811e 96536->96543 96537 7f8088 96549 7f80b7 96537->96549 96538 7f8177 96554 7f4c7d 20 API calls __dosmaperr 96538->96554 96540 7f8180 96555 7f29c8 96540->96555 96543->96537 96543->96538 96552 7e918d RtlEnterCriticalSection 96543->96552 96553 7e91a1 RtlLeaveCriticalSection 96543->96553 96544 7f8189 96544->96537 96561 7f3405 11 API calls 2 library calls 96544->96561 96546 7f81a8 96562 7e918d RtlEnterCriticalSection 96546->96562 96564 7f2fa6 RtlLeaveCriticalSection 96549->96564 96551 7f80be 96551->96529 96552->96543 96553->96543 96554->96540 96556 7f29d3 RtlFreeHeap 96555->96556 96560 7f29fc __dosmaperr 96555->96560 96557 7f29e8 96556->96557 96556->96560 96563 7ef2d9 20 API calls __dosmaperr 96557->96563 96559 7f29ee GetLastError 96559->96560 96560->96544 96561->96546 96562->96537 96563->96559 96564->96551 96566 7c42bc FindResourceExW 96565->96566 96570 7c42d9 96565->96570 96567 8035ba LoadResource 96566->96567 96566->96570 96568 8035cf SizeofResource 96567->96568 96567->96570 96569 8035e3 LockResource 96568->96569 96568->96570 96569->96570 96570->96485 96572 803d90 96571->96572 96573 7c512e 96571->96573 96577 7eece3 96573->96577 96576->96490 96580 7eeaaa 96577->96580 96579 7c513c 96579->96485 96582 7eeab6 BuildCatchObjectHelperInternal 96580->96582 96581 7eeac2 96593 7ef2d9 20 API calls __dosmaperr 96581->96593 96582->96581 96583 7eeae8 96582->96583 96595 7e918d RtlEnterCriticalSection 96583->96595 96586 7eeac7 96594 7f27ec 26 API calls pre_c_initialization 96586->96594 96587 7eeaf4 96596 7eec0a 62 API calls 2 library calls 96587->96596 96590 7eeb08 96597 7eeb27 RtlLeaveCriticalSection __fread_nolock 96590->96597 96592 7eead2 __fread_nolock 96592->96579 96593->96586 96594->96592 96595->96587 96596->96590 96597->96592 96601 7ee8e1 96598->96601 96600 7c5118 96600->96502 96602 7ee8ed BuildCatchObjectHelperInternal 96601->96602 96603 7ee92d 96602->96603 96604 7ee900 ___scrt_fastfail 96602->96604 96605 7ee925 __fread_nolock 96602->96605 96616 7e918d RtlEnterCriticalSection 96603->96616 96614 7ef2d9 20 API calls __dosmaperr 96604->96614 96605->96600 96607 7ee937 96617 7ee6f8 38 API calls 4 library calls 96607->96617 96609 7ee91a 96615 7f27ec 26 API calls pre_c_initialization 96609->96615 96612 7ee94e 96618 7ee96c RtlLeaveCriticalSection __fread_nolock 96612->96618 96614->96609 96615->96605 96616->96607 96617->96612 96618->96605 96622 7ee4e8 96619->96622 96621 83275d 96621->96504 96625 7ee469 96622->96625 96624 7ee505 96624->96621 96626 7ee478 96625->96626 96628 7ee48c 96625->96628 96633 7ef2d9 20 API calls __dosmaperr 96626->96633 96632 7ee488 __alldvrm 96628->96632 96635 7f333f 11 API calls 2 library calls 96628->96635 96629 7ee47d 96634 7f27ec 26 API calls pre_c_initialization 96629->96634 96632->96624 96633->96629 96634->96632 96635->96632 96641 832e7a 96636->96641 96637 7c50f5 40 API calls 96637->96641 96638 832d3b 96638->96433 96638->96434 96639 8328fe 27 API calls 96639->96641 96640 7c511f 64 API calls 96640->96641 96641->96637 96641->96638 96641->96639 96641->96640 96642->96433 96644 7ee684 BuildCatchObjectHelperInternal 96643->96644 96645 7ee6aa 96644->96645 96646 7ee695 96644->96646 96655 7ee6a5 __fread_nolock 96645->96655 96656 7e918d RtlEnterCriticalSection 96645->96656 96673 7ef2d9 20 API calls __dosmaperr 96646->96673 96648 7ee69a 96674 7f27ec 26 API calls pre_c_initialization 96648->96674 96651 7ee6c6 96657 7ee602 96651->96657 96653 7ee6d1 96675 7ee6ee RtlLeaveCriticalSection __fread_nolock 96653->96675 96655->96454 96656->96651 96658 7ee60f 96657->96658 96659 7ee624 96657->96659 96708 7ef2d9 20 API calls __dosmaperr 96658->96708 96665 7ee61f 96659->96665 96676 7edc0b 96659->96676 96662 7ee614 96709 7f27ec 26 API calls pre_c_initialization 96662->96709 96665->96653 96669 7ee646 96693 7f862f 96669->96693 96672 7f29c8 _free 20 API calls 96672->96665 96673->96648 96674->96655 96675->96655 96677 7edc23 96676->96677 96681 7edc1f 96676->96681 96678 7ed955 __fread_nolock 26 API calls 96677->96678 96677->96681 96679 7edc43 96678->96679 96710 7f59be 62 API calls 5 library calls 96679->96710 96682 7f4d7a 96681->96682 96683 7ee640 96682->96683 96684 7f4d90 96682->96684 96686 7ed955 96683->96686 96684->96683 96685 7f29c8 _free 20 API calls 96684->96685 96685->96683 96687 7ed976 96686->96687 96688 7ed961 96686->96688 96687->96669 96711 7ef2d9 20 API calls __dosmaperr 96688->96711 96690 7ed966 96712 7f27ec 26 API calls pre_c_initialization 96690->96712 96692 7ed971 96692->96669 96694 7f863e 96693->96694 96695 7f8653 96693->96695 96716 7ef2c6 20 API calls __dosmaperr 96694->96716 96697 7f868e 96695->96697 96700 7f867a 96695->96700 96718 7ef2c6 20 API calls __dosmaperr 96697->96718 96699 7f8643 96717 7ef2d9 20 API calls __dosmaperr 96699->96717 96713 7f8607 96700->96713 96701 7f8693 96719 7ef2d9 20 API calls __dosmaperr 96701->96719 96705 7ee64c 96705->96665 96705->96672 96706 7f869b 96720 7f27ec 26 API calls pre_c_initialization 96706->96720 96708->96662 96709->96665 96710->96681 96711->96690 96712->96692 96721 7f8585 96713->96721 96715 7f862b 96715->96705 96716->96699 96717->96705 96718->96701 96719->96706 96720->96705 96722 7f8591 BuildCatchObjectHelperInternal 96721->96722 96732 7f5147 RtlEnterCriticalSection 96722->96732 96724 7f859f 96725 7f85c6 96724->96725 96726 7f85d1 96724->96726 96733 7f86ae 96725->96733 96748 7ef2d9 20 API calls __dosmaperr 96726->96748 96729 7f85cc 96749 7f85fb RtlLeaveCriticalSection __wsopen_s 96729->96749 96731 7f85ee __fread_nolock 96731->96715 96732->96724 96750 7f53c4 96733->96750 96735 7f86c4 96763 7f5333 21 API calls 2 library calls 96735->96763 96736 7f86be 96736->96735 96738 7f86f6 96736->96738 96741 7f53c4 __wsopen_s 26 API calls 96736->96741 96738->96735 96739 7f53c4 __wsopen_s 26 API calls 96738->96739 96742 7f8702 CloseHandle 96739->96742 96740 7f871c 96743 7f873e 96740->96743 96764 7ef2a3 20 API calls __dosmaperr 96740->96764 96744 7f86ed 96741->96744 96742->96735 96746 7f870e GetLastError 96742->96746 96743->96729 96745 7f53c4 __wsopen_s 26 API calls 96744->96745 96745->96738 96746->96735 96748->96729 96749->96731 96751 7f53d1 96750->96751 96754 7f53e6 96750->96754 96765 7ef2c6 20 API calls __dosmaperr 96751->96765 96753 7f53d6 96766 7ef2d9 20 API calls __dosmaperr 96753->96766 96757 7f540b 96754->96757 96767 7ef2c6 20 API calls __dosmaperr 96754->96767 96757->96736 96758 7f5416 96768 7ef2d9 20 API calls __dosmaperr 96758->96768 96759 7f53de 96759->96736 96761 7f541e 96769 7f27ec 26 API calls pre_c_initialization 96761->96769 96763->96740 96764->96743 96765->96753 96766->96759 96767->96758 96768->96761 96769->96759 96770 17cf9b0 96784 17cd5e0 96770->96784 96772 17cfa9f 96787 17cf8a0 96772->96787 96774 17cfac8 CreateFileW 96776 17cfb1c 96774->96776 96783 17cfb17 96774->96783 96777 17cfb33 VirtualAlloc 96776->96777 96776->96783 96778 17cfb54 ReadFile 96777->96778 96777->96783 96779 17cfb6f 96778->96779 96778->96783 96780 17ce650 12 API calls 96779->96780 96781 17cfb89 96780->96781 96782 17ce8a0 GetPEB GetPEB 96781->96782 96782->96783 96790 17d0ae0 GetPEB 96784->96790 96786 17cdc6b 96786->96772 96788 17cf8a9 Sleep 96787->96788 96789 17cf8b7 96788->96789 96791 17d0b0a 96790->96791 96791->96786 96792 8ea700 96793 8ea720 96792->96793 96794 8ea83a LoadLibraryA 96793->96794 96795 8ea87f VirtualProtect VirtualProtect 96793->96795 96796 8ea851 96794->96796 96799 8ea8e4 96795->96799 96796->96793 96798 8ea863 GetProcAddress 96796->96798 96798->96796 96800 8ea879 ExitProcess 96798->96800 96799->96799 96801 7c1033 96806 7c4c91 96801->96806 96805 7c1042 96807 7ca961 22 API calls 96806->96807 96808 7c4cff 96807->96808 96814 7c3af0 96808->96814 96810 7c4d9c 96812 7c1038 96810->96812 96817 7c51f7 22 API calls __fread_nolock 96810->96817 96813 7e00a3 29 API calls __onexit 96812->96813 96813->96805 96818 7c3b1c 96814->96818 96817->96810 96819 7c3b29 96818->96819 96821 7c3b0f 96818->96821 96820 7c3b30 RegOpenKeyExW 96819->96820 96819->96821 96820->96821 96822 7c3b4a RegQueryValueExW 96820->96822 96821->96810 96823 7c3b6b 96822->96823 96824 7c3b80 RegCloseKey 96822->96824 96823->96824 96824->96821 96825 7c1cad SystemParametersInfoW 96826 7c1044 96831 7c10f3 96826->96831 96828 7c104a 96867 7e00a3 29 API calls __onexit 96828->96867 96830 7c1054 96868 7c1398 96831->96868 96835 7c116a 96836 7ca961 22 API calls 96835->96836 96837 7c1174 96836->96837 96838 7ca961 22 API calls 96837->96838 96839 7c117e 96838->96839 96840 7ca961 22 API calls 96839->96840 96841 7c1188 96840->96841 96842 7ca961 22 API calls 96841->96842 96843 7c11c6 96842->96843 96844 7ca961 22 API calls 96843->96844 96845 7c1292 96844->96845 96878 7c171c 96845->96878 96849 7c12c4 96850 7ca961 22 API calls 96849->96850 96851 7c12ce 96850->96851 96852 7d1940 9 API calls 96851->96852 96853 7c12f9 96852->96853 96899 7c1aab 96853->96899 96855 7c1315 96856 7c1325 GetStdHandle 96855->96856 96857 802485 96856->96857 96858 7c137a 96856->96858 96857->96858 96859 80248e 96857->96859 96861 7c1387 OleInitialize 96858->96861 96860 7dfddb 22 API calls 96859->96860 96862 802495 96860->96862 96861->96828 96906 83011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96862->96906 96864 80249e 96907 830944 CreateThread 96864->96907 96866 8024aa CloseHandle 96866->96858 96867->96830 96908 7c13f1 96868->96908 96871 7c13f1 22 API calls 96872 7c13d0 96871->96872 96873 7ca961 22 API calls 96872->96873 96874 7c13dc 96873->96874 96875 7c6b57 22 API calls 96874->96875 96876 7c1129 96875->96876 96877 7c1bc3 6 API calls 96876->96877 96877->96835 96879 7ca961 22 API calls 96878->96879 96880 7c172c 96879->96880 96881 7ca961 22 API calls 96880->96881 96882 7c1734 96881->96882 96883 7ca961 22 API calls 96882->96883 96884 7c174f 96883->96884 96885 7dfddb 22 API calls 96884->96885 96886 7c129c 96885->96886 96887 7c1b4a 96886->96887 96888 7c1b58 96887->96888 96889 7ca961 22 API calls 96888->96889 96890 7c1b63 96889->96890 96891 7ca961 22 API calls 96890->96891 96892 7c1b6e 96891->96892 96893 7ca961 22 API calls 96892->96893 96894 7c1b79 96893->96894 96895 7ca961 22 API calls 96894->96895 96896 7c1b84 96895->96896 96897 7dfddb 22 API calls 96896->96897 96898 7c1b96 RegisterClipboardFormatW 96897->96898 96898->96849 96900 7c1abb 96899->96900 96901 80272d 96899->96901 96903 7dfddb 22 API calls 96900->96903 96915 833209 23 API calls 96901->96915 96905 7c1ac3 96903->96905 96904 802738 96905->96855 96906->96864 96907->96866 96916 83092a 28 API calls 96907->96916 96909 7ca961 22 API calls 96908->96909 96910 7c13fc 96909->96910 96911 7ca961 22 API calls 96910->96911 96912 7c1404 96911->96912 96913 7ca961 22 API calls 96912->96913 96914 7c13c6 96913->96914 96914->96871 96915->96904 96917 7cdee5 96920 7cb710 96917->96920 96921 7cb72b 96920->96921 96922 810146 96921->96922 96923 8100f8 96921->96923 96943 7cb750 96921->96943 96962 8458a2 207 API calls 2 library calls 96922->96962 96926 810102 96923->96926 96929 81010f 96923->96929 96923->96943 96960 845d33 207 API calls 96926->96960 96942 7cba20 96929->96942 96961 8461d0 207 API calls 2 library calls 96929->96961 96931 7dd336 40 API calls 96931->96943 96934 8103d9 96934->96934 96936 7cba4e 96938 810322 96965 845c0c 82 API calls 96938->96965 96942->96936 96966 83359c 82 API calls __wsopen_s 96942->96966 96943->96931 96943->96936 96943->96938 96943->96942 96947 7cbbe0 40 API calls 96943->96947 96948 7cec40 207 API calls 96943->96948 96949 7ca8c7 22 API calls 96943->96949 96951 7ca81b 41 API calls 96943->96951 96952 7dd2f0 40 API calls 96943->96952 96953 7da01b 207 API calls 96943->96953 96954 7e0242 5 API calls __Init_thread_wait 96943->96954 96955 7dedcd 22 API calls 96943->96955 96956 7e00a3 29 API calls __onexit 96943->96956 96957 7e01f8 RtlEnterCriticalSection RtlLeaveCriticalSection SetEvent ResetEvent 96943->96957 96958 7dee53 82 API calls 96943->96958 96959 7de5ca 207 API calls 96943->96959 96963 7caceb 23 API calls messages 96943->96963 96964 81f6bf 23 API calls 96943->96964 96947->96943 96948->96943 96949->96943 96951->96943 96952->96943 96953->96943 96954->96943 96955->96943 96956->96943 96957->96943 96958->96943 96959->96943 96960->96929 96961->96942 96962->96943 96963->96943 96964->96943 96965->96942 96966->96934 96967 7f8402 96972 7f81be 96967->96972 96970 7f842a 96977 7f81ef try_get_first_available_module 96972->96977 96974 7f83ee 96991 7f27ec 26 API calls pre_c_initialization 96974->96991 96976 7f8343 96976->96970 96984 800984 96976->96984 96980 7f8338 96977->96980 96987 7e8e0b 40 API calls 2 library calls 96977->96987 96979 7f838c 96979->96980 96988 7e8e0b 40 API calls 2 library calls 96979->96988 96980->96976 96990 7ef2d9 20 API calls __dosmaperr 96980->96990 96982 7f83ab 96982->96980 96989 7e8e0b 40 API calls 2 library calls 96982->96989 96992 800081 96984->96992 96986 80099f 96986->96970 96987->96979 96988->96982 96989->96980 96990->96974 96991->96976 96995 80008d BuildCatchObjectHelperInternal 96992->96995 96993 80009b 97049 7ef2d9 20 API calls __dosmaperr 96993->97049 96995->96993 96997 8000d4 96995->96997 96996 8000a0 97050 7f27ec 26 API calls pre_c_initialization 96996->97050 97003 80065b 96997->97003 97002 8000aa __fread_nolock 97002->96986 97004 800678 97003->97004 97005 8006a6 97004->97005 97006 80068d 97004->97006 97052 7f5221 97005->97052 97066 7ef2c6 20 API calls __dosmaperr 97006->97066 97009 8006ab 97011 8006b4 97009->97011 97012 8006cb 97009->97012 97010 800692 97067 7ef2d9 20 API calls __dosmaperr 97010->97067 97068 7ef2c6 20 API calls __dosmaperr 97011->97068 97065 80039a CreateFileW 97012->97065 97016 8006b9 97069 7ef2d9 20 API calls __dosmaperr 97016->97069 97018 800781 GetFileType 97019 8007d3 97018->97019 97020 80078c GetLastError 97018->97020 97074 7f516a 21 API calls 2 library calls 97019->97074 97072 7ef2a3 20 API calls __dosmaperr 97020->97072 97021 800756 GetLastError 97071 7ef2a3 20 API calls __dosmaperr 97021->97071 97024 800704 97024->97018 97024->97021 97070 80039a CreateFileW 97024->97070 97025 80079a CloseHandle 97025->97010 97027 8007c3 97025->97027 97073 7ef2d9 20 API calls __dosmaperr 97027->97073 97029 800749 97029->97018 97029->97021 97030 8007f4 97032 800840 97030->97032 97075 8005ab 72 API calls 3 library calls 97030->97075 97037 80086d 97032->97037 97076 80014d 72 API calls 4 library calls 97032->97076 97033 8007c8 97033->97010 97036 800866 97036->97037 97038 80087e 97036->97038 97039 7f86ae __wsopen_s 29 API calls 97037->97039 97040 8000f8 97038->97040 97041 8008fc CloseHandle 97038->97041 97039->97040 97051 800121 RtlLeaveCriticalSection __wsopen_s 97040->97051 97077 80039a CreateFileW 97041->97077 97043 800927 97044 800931 GetLastError 97043->97044 97045 80095d 97043->97045 97078 7ef2a3 20 API calls __dosmaperr 97044->97078 97045->97040 97047 80093d 97079 7f5333 21 API calls 2 library calls 97047->97079 97049->96996 97050->97002 97051->97002 97053 7f522d BuildCatchObjectHelperInternal 97052->97053 97080 7f2f5e RtlEnterCriticalSection 97053->97080 97055 7f5234 97056 7f5259 97055->97056 97059 7f52c7 RtlEnterCriticalSection 97055->97059 97062 7f527b 97055->97062 97084 7f5000 21 API calls 3 library calls 97056->97084 97059->97062 97063 7f52d4 RtlLeaveCriticalSection 97059->97063 97060 7f525e 97060->97062 97085 7f5147 RtlEnterCriticalSection 97060->97085 97061 7f52a4 __fread_nolock 97061->97009 97081 7f532a 97062->97081 97063->97055 97065->97024 97066->97010 97067->97040 97068->97016 97069->97010 97070->97029 97071->97010 97072->97025 97073->97033 97074->97030 97075->97032 97076->97036 97077->97043 97078->97047 97079->97045 97080->97055 97086 7f2fa6 RtlLeaveCriticalSection 97081->97086 97083 7f5331 97083->97061 97084->97060 97085->97062 97086->97083 97087 7c2de3 97088 7c2df0 __wsopen_s 97087->97088 97089 7c2e09 97088->97089 97094 802c2b ___scrt_fastfail 97088->97094 97090 7c3aa2 23 API calls 97089->97090 97091 7c2e12 97090->97091 97101 7c2da5 97091->97101 97097 7c6b57 22 API calls 97094->97097 97096 7c2e27 97119 7c44a8 97096->97119 97099 802cab 97097->97099 97099->97099 97102 801f50 __wsopen_s 97101->97102 97103 7c2db2 GetLongPathNameW 97102->97103 97104 7c6b57 22 API calls 97103->97104 97105 7c2dda 97104->97105 97106 7c3598 97105->97106 97107 7ca961 22 API calls 97106->97107 97108 7c35aa 97107->97108 97109 7c3aa2 23 API calls 97108->97109 97110 7c35b5 97109->97110 97111 8032eb 97110->97111 97112 7c35c0 97110->97112 97117 80330d 97111->97117 97155 7dce60 41 API calls 97111->97155 97114 7c515f 22 API calls 97112->97114 97115 7c35cc 97114->97115 97149 7c35f3 97115->97149 97118 7c35df 97118->97096 97120 7c4ecb 94 API calls 97119->97120 97121 7c44cd 97120->97121 97122 803833 97121->97122 97124 7c4ecb 94 API calls 97121->97124 97123 832cf9 80 API calls 97122->97123 97125 803848 97123->97125 97126 7c44e1 97124->97126 97127 803869 97125->97127 97128 80384c 97125->97128 97126->97122 97129 7c44e9 97126->97129 97131 7dfe0b 22 API calls 97127->97131 97130 7c4f39 68 API calls 97128->97130 97132 803854 97129->97132 97133 7c44f5 97129->97133 97130->97132 97142 8038ae 97131->97142 97172 82da5a 82 API calls 97132->97172 97171 7c940c 136 API calls 2 library calls 97133->97171 97136 7c2e31 97137 803862 97137->97127 97138 803a5f 97144 803a67 97138->97144 97139 7c4f39 68 API calls 97139->97144 97140 7ca4a1 22 API calls 97140->97142 97142->97138 97142->97140 97142->97144 97146 7c9cb3 22 API calls 97142->97146 97156 82967e 97142->97156 97159 830b5a 97142->97159 97165 7c3ff7 97142->97165 97173 8295ad 42 API calls _wcslen 97142->97173 97144->97139 97174 82989b 82 API calls __wsopen_s 97144->97174 97146->97142 97150 7c3605 97149->97150 97154 7c3624 __fread_nolock 97149->97154 97152 7dfe0b 22 API calls 97150->97152 97151 7dfddb 22 API calls 97153 7c363b 97151->97153 97152->97154 97153->97118 97154->97151 97155->97111 97157 7dfe0b 22 API calls 97156->97157 97158 8296ae __fread_nolock 97157->97158 97158->97142 97158->97158 97160 830b65 97159->97160 97161 7dfddb 22 API calls 97160->97161 97162 830b7c 97161->97162 97163 7c9cb3 22 API calls 97162->97163 97164 830b87 97163->97164 97164->97142 97166 7c400a 97165->97166 97168 7c40ae 97165->97168 97167 7dfe0b 22 API calls 97166->97167 97169 7c403c 97166->97169 97167->97169 97168->97142 97169->97168 97170 7dfddb 22 API calls 97169->97170 97170->97169 97171->97136 97172->97137 97173->97142 97174->97144

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 240 7c42de-7c434d call 7ca961 GetVersionExW call 7c6b57 245 803617-80362a 240->245 246 7c4353 240->246 247 80362b-80362f 245->247 248 7c4355-7c4357 246->248 249 803631 247->249 250 803632-80363e 247->250 251 7c435d-7c43bc call 7c93b2 call 7c37a0 248->251 252 803656 248->252 249->250 250->247 254 803640-803642 250->254 268 7c43c2-7c43c4 251->268 269 8037df-8037e6 251->269 257 80365d-803660 252->257 254->248 256 803648-80364f 254->256 256->245 261 803651 256->261 258 803666-8036a8 257->258 259 7c441b-7c4435 GetCurrentProcess IsWow64Process 257->259 258->259 262 8036ae-8036b1 258->262 264 7c4494-7c449a 259->264 265 7c4437 259->265 261->252 266 8036b3-8036bd 262->266 267 8036db-8036e5 262->267 270 7c443d-7c4449 264->270 265->270 271 8036ca-8036d6 266->271 272 8036bf-8036c5 266->272 274 8036e7-8036f3 267->274 275 8036f8-803702 267->275 268->257 273 7c43ca-7c43dd 268->273 276 803806-803809 269->276 277 8037e8 269->277 278 7c444f-7c445e LoadLibraryA 270->278 279 803824-803828 GetSystemInfo 270->279 271->259 272->259 280 803726-80372f 273->280 281 7c43e3-7c43e5 273->281 274->259 283 803704-803710 275->283 284 803715-803721 275->284 285 8037f4-8037fc 276->285 286 80380b-80381a 276->286 282 8037ee 277->282 287 7c449c-7c44a6 GetSystemInfo 278->287 288 7c4460-7c446e GetProcAddress 278->288 292 803731-803737 280->292 293 80373c-803748 280->293 290 7c43eb-7c43ee 281->290 291 80374d-803762 281->291 282->285 283->259 284->259 285->276 286->282 294 80381c-803822 286->294 289 7c4476-7c4478 287->289 288->287 295 7c4470-7c4474 GetNativeSystemInfo 288->295 296 7c447a-7c447b FreeLibrary 289->296 297 7c4481-7c4493 289->297 298 803791-803794 290->298 299 7c43f4-7c440f 290->299 300 803764-80376a 291->300 301 80376f-80377b 291->301 292->259 293->259 294->285 295->289 296->297 298->259 302 80379a-8037c1 298->302 303 803780-80378c 299->303 304 7c4415 299->304 300->259 301->259 305 8037c3-8037c9 302->305 306 8037ce-8037da 302->306 303->259 304->259 305->259 306->259
                                                        APIs
                                                        • GetVersionExW.KERNEL32(?), ref: 007C430D
                                                          • Part of subcall function 007C6B57: _wcslen.LIBCMT ref: 007C6B6A
                                                        • GetCurrentProcess.KERNEL32(?,0085CB64,00000000,?,?), ref: 007C4422
                                                        • IsWow64Process.KERNEL32(00000000,?,?), ref: 007C4429
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 007C4454
                                                        • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 007C4466
                                                        • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 007C4474
                                                        • FreeLibrary.KERNEL32(00000000,?,?), ref: 007C447B
                                                        • GetSystemInfo.KERNEL32(?,?,?), ref: 007C44A0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                        • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                        • API String ID: 3290436268-3101561225
                                                        • Opcode ID: 85377e108e7df802bfd6884d83de35b68c0f4a7e033e81a48c06fab647145d73
                                                        • Instruction ID: 877f89cdbcc267a00211539e8e5e73aa2dd8269f22b28fbab3604a7d915e7fef
                                                        • Opcode Fuzzy Hash: 85377e108e7df802bfd6884d83de35b68c0f4a7e033e81a48c06fab647145d73
                                                        • Instruction Fuzzy Hash: F2A1856590E3C2DFCF16E7797C496A67FB8BB66300B1C44AFD44193B61D62C4608EB21

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 448 7c3170-7c3185 449 7c31e5-7c31e7 448->449 450 7c3187-7c318a 448->450 449->450 451 7c31e9 449->451 452 7c318c-7c3193 450->452 453 7c31eb 450->453 454 7c31d0-7c31d8 NtdllDefWindowProc_W 451->454 457 7c3199-7c319e 452->457 458 7c3265-7c326d PostQuitMessage 452->458 455 802dfb-802e23 call 7c18e2 call 7de499 453->455 456 7c31f1-7c31f6 453->456 464 7c31de-7c31e4 454->464 494 802e28-802e2f 455->494 459 7c321d-7c3244 SetTimer RegisterClipboardFormatW 456->459 460 7c31f8-7c31fb 456->460 462 7c31a4-7c31a8 457->462 463 802e7c-802e90 call 82bf30 457->463 465 7c3219-7c321b 458->465 459->465 469 7c3246-7c3251 CreatePopupMenu 459->469 466 802d9c-802d9f 460->466 467 7c3201-7c3214 KillTimer call 7c30f2 call 7c3c50 460->467 470 7c31ae-7c31b3 462->470 471 802e68-802e77 call 82c161 462->471 463->465 489 802e96 463->489 465->464 473 802da1-802da5 466->473 474 802dd7-802df6 MoveWindow 466->474 467->465 469->465 478 7c31b9-7c31be 470->478 479 802e4d-802e54 470->479 471->465 481 802dc6-802dd2 SetFocus 473->481 482 802da7-802daa 473->482 474->465 487 7c31c4-7c31ca 478->487 488 7c3253-7c3263 call 7c326f 478->488 479->454 483 802e5a-802e63 call 820ad7 479->483 481->465 482->487 490 802db0-802dc1 call 7c18e2 482->490 483->454 487->454 487->494 488->465 489->454 490->465 494->454 498 802e35-802e48 call 7c30f2 call 7c3837 494->498 498->454
                                                        APIs
                                                        • NtdllDefWindowProc_W.NTDLL(?,?,?,?,?,?,?,?,?,007C316A,?,?), ref: 007C31D8
                                                        • KillTimer.USER32(?,00000001,?,?,?,?,?,007C316A,?,?), ref: 007C3204
                                                        • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 007C3227
                                                        • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 007C3232
                                                        • CreatePopupMenu.USER32 ref: 007C3246
                                                        • PostQuitMessage.USER32(00000000), ref: 007C3267
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Timer$ClipboardCreateFormatKillMenuMessageNtdllPopupPostProc_QuitRegisterWindow
                                                        • String ID: TaskbarCreated
                                                        • API String ID: 157504867-2362178303
                                                        • Opcode ID: 325329408b397b50699891cc3888727433dfc2025cad70639e8ce8f6f39e228a
                                                        • Instruction ID: 31d86aab01b88ff0ffcd981ba878570e65abad4e90c1351b976ae614db042165
                                                        • Opcode Fuzzy Hash: 325329408b397b50699891cc3888727433dfc2025cad70639e8ce8f6f39e228a
                                                        • Instruction Fuzzy Hash: 5541D735248209AFDF152B789D4DFB93B69F705340F0C812EF902C66E1C76D9E40ABA1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 538 7c42a2-7c42ba CreateStreamOnHGlobal 539 7c42bc-7c42d3 FindResourceExW 538->539 540 7c42da-7c42dd 538->540 541 7c42d9 539->541 542 8035ba-8035c9 LoadResource 539->542 541->540 542->541 543 8035cf-8035dd SizeofResource 542->543 543->541 544 8035e3-8035ee LockResource 543->544 544->541 545 8035f4-803612 544->545 545->541
                                                        APIs
                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 007C42B2
                                                        • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,007C50AA,?,?,00000000,00000000), ref: 007C42C9
                                                        • LoadResource.KERNEL32(?,00000000,?,?,007C50AA,?,?,00000000,00000000,?,?,?,?,?,?,007C4F20), ref: 008035BE
                                                        • SizeofResource.KERNEL32(?,00000000,?,?,007C50AA,?,?,00000000,00000000,?,?,?,?,?,?,007C4F20), ref: 008035D3
                                                        • LockResource.KERNEL32(007C50AA,?,?,007C50AA,?,?,00000000,00000000,?,?,?,?,?,?,007C4F20,?), ref: 008035E6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                        • String ID: SCRIPT
                                                        • API String ID: 3051347437-3967369404
                                                        • Opcode ID: 1ee6d77447cd219d20e929bbe9dff02f2452c3e80102016f9d68713d308c1e92
                                                        • Instruction ID: bc047b3bcfcb8bc9d01cf56bbc71226552b3774464744a5f2c00cbf489c35105
                                                        • Opcode Fuzzy Hash: 1ee6d77447cd219d20e929bbe9dff02f2452c3e80102016f9d68713d308c1e92
                                                        • Instruction Fuzzy Hash: 6B117971200700BFEB218BA5DC49F277BBAFBC5B52F20816DB816D62A0DB75D800DA20

                                                        Control-flow Graph

                                                        APIs
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 007C2B6B
                                                          • Part of subcall function 007C3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00891418,?,007C2E7F,?,?,?,00000000), ref: 007C3A78
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                        • GetForegroundWindow.USER32(runas,?,?,?,?,?,00882224), ref: 00802C10
                                                        • ShellExecuteW.SHELL32(00000000,?,?,00882224), ref: 00802C17
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                        • String ID: runas
                                                        • API String ID: 448630720-4000483414
                                                        • Opcode ID: c2a164baaa303c2780b43db4508404e0804ac25bb8911e46108a781bec5159b9
                                                        • Instruction ID: cbadce0eefe39af43e481c5cdded0b2d91fe8c15ac48121c378e466dc42b696e
                                                        • Opcode Fuzzy Hash: c2a164baaa303c2780b43db4508404e0804ac25bb8911e46108a781bec5159b9
                                                        • Instruction Fuzzy Hash: A911D231208341DACB14FF60D85DFAEBBA5FB94310F48442DF192420A3DF2C894A8712
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: InputSleepStateTimetime
                                                        • String ID:
                                                        • API String ID: 4149333218-0
                                                        • Opcode ID: 86c5cb96f59177f098f9862ee03a33ce0af133e91b57f7bff42ed477f8d7208b
                                                        • Instruction ID: 8ec6db029b2263934147f965f486b12ccf2834d0bc8b02479fe64185be12bfa5
                                                        • Opcode Fuzzy Hash: 86c5cb96f59177f098f9862ee03a33ce0af133e91b57f7bff42ed477f8d7208b
                                                        • Instruction Fuzzy Hash: 5542AD70608341EFDB35DF24C888FAAB7A5FF85304F14852EE55687291D778AC94CB92

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 307 80065b-80068b call 80042f 310 8006a6-8006b2 call 7f5221 307->310 311 80068d-800698 call 7ef2c6 307->311 316 8006b4-8006c9 call 7ef2c6 call 7ef2d9 310->316 317 8006cb-800714 call 80039a 310->317 318 80069a-8006a1 call 7ef2d9 311->318 316->318 327 800781-80078a GetFileType 317->327 328 800716-80071f 317->328 325 80097d-800983 318->325 329 8007d3-8007d6 327->329 330 80078c-8007bd GetLastError call 7ef2a3 CloseHandle 327->330 332 800721-800725 328->332 333 800756-80077c GetLastError call 7ef2a3 328->333 336 8007d8-8007dd 329->336 337 8007df-8007e5 329->337 330->318 344 8007c3-8007ce call 7ef2d9 330->344 332->333 338 800727-800754 call 80039a 332->338 333->318 341 8007e9-800837 call 7f516a 336->341 337->341 342 8007e7 337->342 338->327 338->333 349 800847-80086b call 80014d 341->349 350 800839-800845 call 8005ab 341->350 342->341 344->318 357 80086d 349->357 358 80087e-8008c1 349->358 350->349 356 80086f-800879 call 7f86ae 350->356 356->325 357->356 360 8008e2-8008f0 358->360 361 8008c3-8008c7 358->361 364 8008f6-8008fa 360->364 365 80097b 360->365 361->360 363 8008c9-8008dd 361->363 363->360 364->365 366 8008fc-80092f CloseHandle call 80039a 364->366 365->325 369 800931-80095d GetLastError call 7ef2a3 call 7f5333 366->369 370 800963-800977 366->370 369->370 370->365
                                                        APIs
                                                          • Part of subcall function 0080039A: CreateFileW.KERNELBASE(00000000,00000000,?,00800704,?,?,00000000,?,00800704,00000000,0000000C), ref: 008003B7
                                                        • GetLastError.KERNEL32 ref: 0080076F
                                                        • __dosmaperr.LIBCMT ref: 00800776
                                                        • GetFileType.KERNELBASE(00000000), ref: 00800782
                                                        • GetLastError.KERNEL32 ref: 0080078C
                                                        • __dosmaperr.LIBCMT ref: 00800795
                                                        • CloseHandle.KERNEL32(00000000), ref: 008007B5
                                                        • CloseHandle.KERNEL32(?), ref: 008008FF
                                                        • GetLastError.KERNEL32 ref: 00800931
                                                        • __dosmaperr.LIBCMT ref: 00800938
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                        • String ID: H
                                                        • API String ID: 4237864984-2852464175
                                                        • Opcode ID: f12c2bdba94906bd693ed0cd2ce33d9df6858d41d45c9b36e884e0cc3316bf0a
                                                        • Instruction ID: 76461b565d984ef6a90e71f7766223acc16a769d36a058756c863045d39662f6
                                                        • Opcode Fuzzy Hash: f12c2bdba94906bd693ed0cd2ce33d9df6858d41d45c9b36e884e0cc3316bf0a
                                                        • Instruction Fuzzy Hash: 24A13632A002488FDF19AF68DC55BAE3BA0FB06324F14415AF815DB3D2DB359912CF92

                                                        Control-flow Graph

                                                        APIs
                                                          • Part of subcall function 007C3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00891418,?,007C2E7F,?,?,?,00000000), ref: 007C3A78
                                                          • Part of subcall function 007C3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 007C3379
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 007C356A
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0080318D
                                                        • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 008031CE
                                                        • RegCloseKey.ADVAPI32(?), ref: 00803210
                                                        • _wcslen.LIBCMT ref: 00803277
                                                        • _wcslen.LIBCMT ref: 00803286
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                        • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                        • API String ID: 98802146-2727554177
                                                        • Opcode ID: 2a65889e515c95e85fd32e6f328fe66fa467e8dbf61182c34877296672313600
                                                        • Instruction ID: f34e1c1a9b4552f75af602e5985a78e26473695cb287f801d2ed79d84cd9e032
                                                        • Opcode Fuzzy Hash: 2a65889e515c95e85fd32e6f328fe66fa467e8dbf61182c34877296672313600
                                                        • Instruction Fuzzy Hash: F1716C71505301EEC314EF65EC869ABBBE8FF89340B44452EF545D32B1EB389A48DB62

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 007C2B8E
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 007C2B9D
                                                        • LoadIconW.USER32(00000063), ref: 007C2BB3
                                                        • LoadIconW.USER32(000000A4), ref: 007C2BC5
                                                        • LoadIconW.USER32(000000A2), ref: 007C2BD7
                                                        • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 007C2BEF
                                                        • RegisterClassExW.USER32(?), ref: 007C2C40
                                                          • Part of subcall function 007C2CD4: GetSysColorBrush.USER32(0000000F), ref: 007C2D07
                                                          • Part of subcall function 007C2CD4: RegisterClassExW.USER32(00000030), ref: 007C2D31
                                                          • Part of subcall function 007C2CD4: RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 007C2D42
                                                          • Part of subcall function 007C2CD4: LoadIconW.USER32(000000A9), ref: 007C2D85
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Load$Icon$Register$BrushClassColor$ClipboardCursorFormatImage
                                                        • String ID: #$0$AutoIt v3
                                                        • API String ID: 2880975755-4155596026
                                                        • Opcode ID: ebb1f9b92a4203b603fed041209b49684bc7dcb26331c05461d338a06bde891a
                                                        • Instruction ID: 5643461955c447aa3e7c3e07ed61d6bcf6bb62529ec538eb7057c4358dda30b2
                                                        • Opcode Fuzzy Hash: ebb1f9b92a4203b603fed041209b49684bc7dcb26331c05461d338a06bde891a
                                                        • Instruction Fuzzy Hash: 7B211A70E04319AFDF10AFA9EC59B997FB4FB48B50F08411BE504A67A0D7B90540EF90

                                                        Control-flow Graph

                                                        APIs
                                                        • GetSysColorBrush.USER32(0000000F), ref: 007C2D07
                                                        • RegisterClassExW.USER32(00000030), ref: 007C2D31
                                                        • RegisterClipboardFormatW.USER32(TaskbarCreated), ref: 007C2D42
                                                        • LoadIconW.USER32(000000A9), ref: 007C2D85
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Register$BrushClassClipboardColorFormatIconLoad
                                                        • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                        • API String ID: 975902462-1005189915
                                                        • Opcode ID: c56f464fd07a216dc0c55e20c3a9fc8ed6d7bece3386665310a908e3c5f91bcf
                                                        • Instruction ID: 37bf9d576a46a9cb043270db42efa9b5cc69a5cdd284c1c3d9e221916fc79750
                                                        • Opcode Fuzzy Hash: c56f464fd07a216dc0c55e20c3a9fc8ed6d7bece3386665310a908e3c5f91bcf
                                                        • Instruction Fuzzy Hash: 9F21B2B5905319AFDF00EFA4EC49B9DBFB4FB08B01F14811AFA11A62A0D7B95544CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 508 17cdf00-17cdf52 call 17cde00 CreateFileW 511 17cdf5b-17cdf68 508->511 512 17cdf54-17cdf56 508->512 515 17cdf6a-17cdf76 511->515 516 17cdf7b-17cdf92 VirtualAlloc 511->516 513 17ce0b4-17ce0b8 512->513 515->513 517 17cdf9b-17cdfc1 CreateFileW 516->517 518 17cdf94-17cdf96 516->518 520 17cdfe5-17cdfff ReadFile 517->520 521 17cdfc3-17cdfe0 517->521 518->513 522 17ce001-17ce01e 520->522 523 17ce023-17ce027 520->523 521->513 522->513 524 17ce048-17ce05f WriteFile 523->524 525 17ce029-17ce046 523->525 527 17ce08a-17ce0af CloseHandle VirtualFree 524->527 528 17ce061-17ce088 524->528 525->513 527->513 528->513
                                                        APIs
                                                        • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 017CDF45
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1741459454.00000000017CD000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17cd000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                        • Instruction ID: 00396d21a834ad2dedad4bb9a9d3560c21f08218a25e892cd42053cbf6d81f51
                                                        • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                        • Instruction Fuzzy Hash: E551FC75A50249FBDF20DFA4CC49FDEBB78BF48B00F108558FA59EA1C0DA7496448BA1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 548 7c2c63-7c2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                        APIs
                                                        • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 007C2C91
                                                        • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 007C2CB2
                                                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,007C1CAD,?), ref: 007C2CC6
                                                        • ShowWindow.USER32(00000000,?,?,?,?,?,?,007C1CAD,?), ref: 007C2CCF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$CreateShow
                                                        • String ID: AutoIt v3$edit
                                                        • API String ID: 1584632944-3779509399
                                                        • Opcode ID: ac1ae4fb455c1bf6644759a41150ef7ae0ae30780858ed2996971231fef3964f
                                                        • Instruction ID: 122572d6b13ff50bc621053de1057b4ad885caa5a5304f01e7feddc591a9e2ee
                                                        • Opcode Fuzzy Hash: ac1ae4fb455c1bf6644759a41150ef7ae0ae30780858ed2996971231fef3964f
                                                        • Instruction Fuzzy Hash: 9FF0DA755443917EEF312727AC0CE772EBDF7CAF51B04005AF904A26A0C6791854EEB0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 663 8ea700-8ea717 664 8ea72a-8ea72f 663->664 665 8ea731 664->665 666 8ea733 665->666 667 8ea720-8ea725 665->667 669 8ea738-8ea73a 666->669 668 8ea726-8ea728 667->668 668->664 668->665 670 8ea73c-8ea741 669->670 671 8ea743-8ea747 669->671 670->671 672 8ea749 671->672 673 8ea754-8ea757 671->673 676 8ea74b-8ea752 672->676 677 8ea773-8ea778 672->677 674 8ea759-8ea75e 673->674 675 8ea760-8ea762 673->675 674->675 675->669 676->673 676->677 678 8ea77a-8ea783 677->678 679 8ea78b-8ea78d 677->679 680 8ea7fa-8ea7fd 678->680 681 8ea785-8ea789 678->681 682 8ea78f-8ea794 679->682 683 8ea796 679->683 684 8ea802-8ea805 680->684 681->683 682->683 685 8ea798-8ea79b 683->685 686 8ea764-8ea766 683->686 689 8ea807-8ea809 684->689 690 8ea79d-8ea7a2 685->690 691 8ea7a4 685->691 687 8ea76f-8ea771 686->687 688 8ea768-8ea76d 686->688 692 8ea7c5-8ea7d4 687->692 688->687 689->684 693 8ea80b-8ea80e 689->693 690->691 691->686 694 8ea7a6-8ea7a8 691->694 695 8ea7d6-8ea7dd 692->695 696 8ea7e4-8ea7f1 692->696 693->684 697 8ea810-8ea82c 693->697 698 8ea7aa-8ea7af 694->698 699 8ea7b1-8ea7b5 694->699 695->695 701 8ea7df 695->701 696->696 702 8ea7f3-8ea7f5 696->702 697->689 703 8ea82e 697->703 698->699 699->694 700 8ea7b7 699->700 704 8ea7b9-8ea7c0 700->704 705 8ea7c2 700->705 701->668 702->668 706 8ea834-8ea838 703->706 704->694 704->705 705->692 707 8ea87f-8ea882 706->707 708 8ea83a-8ea850 LoadLibraryA 706->708 710 8ea885-8ea88c 707->710 709 8ea851-8ea856 708->709 709->706 711 8ea858-8ea85a 709->711 712 8ea88e-8ea890 710->712 713 8ea8b0-8ea8e0 VirtualProtect * 2 710->713 714 8ea85c-8ea862 711->714 715 8ea863-8ea870 GetProcAddress 711->715 716 8ea892-8ea8a1 712->716 717 8ea8a3-8ea8ae 712->717 718 8ea8e4-8ea8e8 713->718 714->715 719 8ea879 ExitProcess 715->719 720 8ea872-8ea877 715->720 716->710 717->716 718->718 721 8ea8ea 718->721 720->709
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(?), ref: 008EA84A
                                                        • GetProcAddress.KERNEL32(?,008E3FF9), ref: 008EA868
                                                        • ExitProcess.KERNEL32(?,008E3FF9), ref: 008EA879
                                                        • VirtualProtect.KERNELBASE(007C0000,00001000,00000004,?,00000000), ref: 008EA8C7
                                                        • VirtualProtect.KERNELBASE(007C0000,00001000,?,?,?,00000000), ref: 008EA8DC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual$AddressExitLibraryLoadProcProcess
                                                        • String ID:
                                                        • API String ID: 1996367037-0
                                                        • Opcode ID: 6d1542817a9bdb356d37fe16b1297f2bbcdb02e2e7cb3f76d35fee02ec3c959d
                                                        • Instruction ID: 818956bcf84afc7bbd3bfe13c25d6f54b6c9a942c0102661ff3002c5379eeda5
                                                        • Opcode Fuzzy Hash: 6d1542817a9bdb356d37fe16b1297f2bbcdb02e2e7cb3f76d35fee02ec3c959d
                                                        • Instruction Fuzzy Hash: 8A5129B2A443965BD728DE79DCC066077A4FB53B247280739C9E2C73C5E7A47C068762

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 722 17cf9b0-17cfb15 call 17cd5e0 call 17cf8a0 CreateFileW 729 17cfb1c-17cfb2c 722->729 730 17cfb17 722->730 733 17cfb2e 729->733 734 17cfb33-17cfb4d VirtualAlloc 729->734 731 17cfbe9-17cfbee 730->731 733->731 735 17cfb4f 734->735 736 17cfb54-17cfb6b ReadFile 734->736 735->731 737 17cfb6d 736->737 738 17cfb6f-17cfb84 call 17ce650 736->738 737->731 740 17cfb89-17cfbc3 call 17cf8e0 call 17ce8a0 738->740 745 17cfbdf-17cfbe7 740->745 746 17cfbc5-17cfbda call 17cf930 740->746 745->731 746->745
                                                        APIs
                                                          • Part of subcall function 017CF8A0: Sleep.KERNELBASE(000001F4), ref: 017CF8B1
                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 017CFB0B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1741459454.00000000017CD000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17cd000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CreateFileSleep
                                                        • String ID: F1E2SELYEZ34QCDUESCCY0VLXW
                                                        • API String ID: 2694422964-1065262266
                                                        • Opcode ID: 19e4d25913f06c4eff6f5b433fc0c3887425ed1eaa67f734deec09b520e85571
                                                        • Instruction ID: 207e7e5c1a2bb1cd4d15a06336527ed5f6e933dc354ce6bb864c9f74b730ba8f
                                                        • Opcode Fuzzy Hash: 19e4d25913f06c4eff6f5b433fc0c3887425ed1eaa67f734deec09b520e85571
                                                        • Instruction Fuzzy Hash: 22616130D08248DAEF11DBB4C858BEEBB75AF15704F04459CE2487B2C1D7B91B49CBA5

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 785 7c3b1c-7c3b27 786 7c3b99-7c3b9b 785->786 787 7c3b29-7c3b2e 785->787 789 7c3b8c-7c3b8f 786->789 787->786 788 7c3b30-7c3b48 RegOpenKeyExW 787->788 788->786 790 7c3b4a-7c3b69 RegQueryValueExW 788->790 791 7c3b6b-7c3b76 790->791 792 7c3b80-7c3b8b RegCloseKey 790->792 793 7c3b78-7c3b7a 791->793 794 7c3b90-7c3b97 791->794 792->789 795 7c3b7e 793->795 794->795 795->792
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,007C3B0F,SwapMouseButtons,00000004,?), ref: 007C3B40
                                                        • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,007C3B0F,SwapMouseButtons,00000004,?), ref: 007C3B61
                                                        • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,007C3B0F,SwapMouseButtons,00000004,?), ref: 007C3B83
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CloseOpenQueryValue
                                                        • String ID: Control Panel\Mouse
                                                        • API String ID: 3677997916-824357125
                                                        • Opcode ID: 9c8030313db181661d32c067842f3f77f430c98c4195f7efd825a160fab383a0
                                                        • Instruction ID: 18c0af9de58db67b25e2d5d45c0897365addcfb2ec79d1cd9fc069948672e21a
                                                        • Opcode Fuzzy Hash: 9c8030313db181661d32c067842f3f77f430c98c4195f7efd825a160fab383a0
                                                        • Instruction Fuzzy Hash: 0D1127B5610208FFDB208FA5DC84EEFBBB8EF04795B10846EB805D7110E235AE409BA0
                                                        Strings
                                                        • Variable must be of type 'Object'., xrefs: 008132B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Variable must be of type 'Object'.
                                                        • API String ID: 0-109567571
                                                        • Opcode ID: dc3f5122b018b970b883b06a68c3cdb5b2057244d41427fb7a0e9e8d63cff7ae
                                                        • Instruction ID: 71d6c66c30a8adbca869514a7f07baf3d1c27886e606a198c0f79f1c725403f7
                                                        • Opcode Fuzzy Hash: dc3f5122b018b970b883b06a68c3cdb5b2057244d41427fb7a0e9e8d63cff7ae
                                                        • Instruction Fuzzy Hash: B5C24571A00214DFCB24DF58C884BADB7B5FF18310F24856EE956AB391D379AD81CB91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1306 7c3923-7c3939 1307 7c393f-7c3954 call 7c6270 1306->1307 1308 7c3a13-7c3a17 1306->1308 1311 803393-8033a2 LoadStringW 1307->1311 1312 7c395a-7c3976 call 7c6b57 1307->1312 1315 8033ad-8033b6 1311->1315 1318 7c397c-7c3980 1312->1318 1319 8033c9-8033e5 call 7c6350 call 7c3fcf 1312->1319 1316 7c3994-7c3a0e call 7e2340 call 7c3a18 call 7e4983 Shell_NotifyIconW call 7c988f 1315->1316 1317 8033bc-8033c4 call 7ca8c7 1315->1317 1316->1308 1317->1316 1318->1315 1321 7c3986-7c398f call 7c6350 1318->1321 1319->1316 1332 8033eb-803409 call 7c33c6 call 7c3fcf call 7c33c6 1319->1332 1321->1316 1332->1316
                                                        APIs
                                                        • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 008033A2
                                                          • Part of subcall function 007C6B57: _wcslen.LIBCMT ref: 007C6B6A
                                                        • Shell_NotifyIconW.SHELL32(00000001,?), ref: 007C3A04
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: IconLoadNotifyShell_String_wcslen
                                                        • String ID: Line:
                                                        • API String ID: 2289894680-1585850449
                                                        • Opcode ID: 7eee438ef9bcf23b1f134f0b4a16973b90e5a9f89af924d2075c2a6ce636a62e
                                                        • Instruction ID: 8819eea696ff22caa13f904329a7335340c7115a082d19f31f2670af5a0d4ec2
                                                        • Opcode Fuzzy Hash: 7eee438ef9bcf23b1f134f0b4a16973b90e5a9f89af924d2075c2a6ce636a62e
                                                        • Instruction Fuzzy Hash: 6A31C271408301AAD721EB20DC49FEBB7ECBB44714F04892EF59992291DB7CAA48C7C2
                                                        APIs
                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 007E0668
                                                          • Part of subcall function 007E32A4: RaiseException.KERNEL32(?,?,?,007E068A,?,00891444,?,?,?,?,?,?,007E068A,007C1129,00888738,007C1129), ref: 007E3304
                                                        • __CxxThrowException@8.LIBVCRUNTIME ref: 007E0685
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$ExceptionRaise
                                                        • String ID: Unknown exception
                                                        • API String ID: 3476068407-410509341
                                                        • Opcode ID: b9a732f339d1fb9e90f0d2163463b3e974ebc1e738862f35fad4af28cbd7e9e4
                                                        • Instruction ID: 8c0d27525c9208a91f4cb87982e1bd4ab32a0219edb697a197c4835dd280a50a
                                                        • Opcode Fuzzy Hash: b9a732f339d1fb9e90f0d2163463b3e974ebc1e738862f35fad4af28cbd7e9e4
                                                        • Instruction Fuzzy Hash: 58F04C3490128DF3CF00B676D84ED5E777DAE04310BA04431F924D6691EFB8DA65C6C0
                                                        APIs
                                                        • CreateProcessW.KERNELBASE(?,00000000), ref: 017CE625
                                                        • ExitProcess.KERNEL32(00000000), ref: 017CE644
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1741459454.00000000017CD000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17cd000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Process$CreateExit
                                                        • String ID: D
                                                        • API String ID: 126409537-2746444292
                                                        • Opcode ID: 8ff53cc741f04adc946779470c72492426263afa614c789403871e93d35377f7
                                                        • Instruction ID: 0caef6cfb0a0badfbe33d6bf317486098ec2461d5c58e93910791aa7837c453b
                                                        • Opcode Fuzzy Hash: 8ff53cc741f04adc946779470c72492426263afa614c789403871e93d35377f7
                                                        • Instruction Fuzzy Hash: 8CF0C975540248ABDB60DFE4CC49FEEB778AB04B01F14850CFA0A9A184DA7496088B61
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 008482F5
                                                        • TerminateProcess.KERNEL32(00000000), ref: 008482FC
                                                        • FreeLibrary.KERNEL32(?,?,?,?), ref: 008484DD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentFreeLibraryTerminate
                                                        • String ID:
                                                        • API String ID: 146820519-0
                                                        • Opcode ID: 35262fb28f3b29be7d4d03b8a4b86485d9ef4512f70bb4fbe4204b744b11438b
                                                        • Instruction ID: 623915f23a4086d1d853db6e9e33ff4344626fce232997f146859de2950e0c7e
                                                        • Opcode Fuzzy Hash: 35262fb28f3b29be7d4d03b8a4b86485d9ef4512f70bb4fbe4204b744b11438b
                                                        • Instruction Fuzzy Hash: B1125871A08345DFC724DF28C484B2ABBE5FF89318F04895DE889CB252DB35E945CB92
                                                        APIs
                                                          • Part of subcall function 007C1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 007C1BF4
                                                          • Part of subcall function 007C1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 007C1BFC
                                                          • Part of subcall function 007C1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 007C1C07
                                                          • Part of subcall function 007C1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 007C1C12
                                                          • Part of subcall function 007C1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 007C1C1A
                                                          • Part of subcall function 007C1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 007C1C22
                                                          • Part of subcall function 007C1B4A: RegisterClipboardFormatW.USER32(00000004), ref: 007C1BA2
                                                        • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 007C136A
                                                        • OleInitialize.OLE32 ref: 007C1388
                                                        • CloseHandle.KERNEL32(00000000,00000000), ref: 008024AB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Virtual$Handle$ClipboardCloseFormatInitializeRegister
                                                        • String ID:
                                                        • API String ID: 3094916012-0
                                                        • Opcode ID: 648db96c1f4162595524f4b7cd22c550c04d569668c18cba72632e12f5743cd9
                                                        • Instruction ID: edd2bf79495671fb66d00451c9b4c2c1d9e87d2ccf29af1dd76bae969a3e2a5c
                                                        • Opcode Fuzzy Hash: 648db96c1f4162595524f4b7cd22c550c04d569668c18cba72632e12f5743cd9
                                                        • Instruction Fuzzy Hash: 2071B7B49193028ECF85FFB9A94DA583BE1FB8834434E822FE51AD7261EB344409CF44
                                                        APIs
                                                        • CloseHandle.KERNELBASE(00000000,00000000,?,?,007F85CC,?,00888CC8,0000000C), ref: 007F8704
                                                        • GetLastError.KERNEL32(?,007F85CC,?,00888CC8,0000000C), ref: 007F870E
                                                        • __dosmaperr.LIBCMT ref: 007F8739
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CloseErrorHandleLast__dosmaperr
                                                        • String ID:
                                                        • API String ID: 2583163307-0
                                                        • Opcode ID: 667951fa9933c60d698ac04c79d75b9f40f78a9bbbb3a8944b0eb03e8913a3c3
                                                        • Instruction ID: 3073a3774a925ade5aefb2766007471988db13c6d119924614a4fd1bfc997411
                                                        • Opcode Fuzzy Hash: 667951fa9933c60d698ac04c79d75b9f40f78a9bbbb3a8944b0eb03e8913a3c3
                                                        • Instruction Fuzzy Hash: EE016B33605A285AC2A07338A84D77E67894F8277DF390119FB14CB3D3DEAC8C818152
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 007D17F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer
                                                        • String ID: CALL
                                                        • API String ID: 1385522511-4196123274
                                                        • Opcode ID: 56239767ec0312c2d4d8b13ce76b85babaa9eda98aae120f86ac986f4754e05a
                                                        • Instruction ID: 170eba3241e4f5feeab7120dc3ac26264de3484d04bde3e3363a1f885dac8afc
                                                        • Opcode Fuzzy Hash: 56239767ec0312c2d4d8b13ce76b85babaa9eda98aae120f86ac986f4754e05a
                                                        • Instruction Fuzzy Hash: 7922AB70608201EFC714DF14C484A6ABBF5FF89314F58896EF4968B362D739E895CB92
                                                        APIs
                                                        • Shell_NotifyIconW.SHELL32(00000000,?), ref: 007C3908
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_
                                                        • String ID:
                                                        • API String ID: 1144537725-0
                                                        • Opcode ID: f581e03c7a8f7e987a57c4a5a8e90964553bcc1df6d5c9502572ca0343bd820b
                                                        • Instruction ID: 2911a6f6d5dcfe648347823d47dcbb842dc7815cc925c37a7e28ecda6d1ec9ca
                                                        • Opcode Fuzzy Hash: f581e03c7a8f7e987a57c4a5a8e90964553bcc1df6d5c9502572ca0343bd820b
                                                        • Instruction Fuzzy Hash: 1E314C705047019FD721EF24D889B97BBF8FB49708F04096EF59987250E779AA44CB52
                                                        APIs
                                                        • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,007C949C,?,00008000), ref: 007C5773
                                                        • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,007C949C,?,00008000), ref: 00804052
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: 87285a83cbefd28ad99c9e4f320182cfbf96b6f5eb0dfabb10542e508ad032a2
                                                        • Instruction ID: b9949a9906a9d1cb8a4a5c0cc9b1c8492a4018bf54af2f74077197fd30107e99
                                                        • Opcode Fuzzy Hash: 87285a83cbefd28ad99c9e4f320182cfbf96b6f5eb0dfabb10542e508ad032a2
                                                        • Instruction Fuzzy Hash: 40015631185725B6E3714A26DC0EF977F58EF027B1F148318BA5C6E1E0C7B95494CB90
                                                        APIs
                                                        • __Init_thread_footer.LIBCMT ref: 007CBB4E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Init_thread_footer
                                                        • String ID:
                                                        • API String ID: 1385522511-0
                                                        • Opcode ID: 73e8e770284e2cdbfd20ce25f266b5574f5b97f55095e614e8b52cfe8822ec2d
                                                        • Instruction ID: 268623ebc21e7483f4b3376d7817008d3fcdd4e8d3ef4fd5f2ca0c7bb4c193a6
                                                        • Opcode Fuzzy Hash: 73e8e770284e2cdbfd20ce25f266b5574f5b97f55095e614e8b52cfe8822ec2d
                                                        • Instruction Fuzzy Hash: 1A325770A00209EFDB24DF54C895FAAB7B9FF44314F18805EE915AB361D7B8AD81CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: LoadString
                                                        • String ID:
                                                        • API String ID: 2948472770-0
                                                        • Opcode ID: 899bf37f96b25014e8d618a38a1c4023344191380d720f7b05a82c38b5f1eaf5
                                                        • Instruction ID: 6623c1d3f6b3ff5888dcf1d288235d7540ef6fb09e8b31a91090e4f784ca2a64
                                                        • Opcode Fuzzy Hash: 899bf37f96b25014e8d618a38a1c4023344191380d720f7b05a82c38b5f1eaf5
                                                        • Instruction Fuzzy Hash: 85D14935A0420AEFCB14EF98D885DADBBB5FF48314F54405AE905EB391EB34AD81CB91
                                                        APIs
                                                          • Part of subcall function 017CDEC0: GetFileAttributesW.KERNELBASE(?), ref: 017CDECB
                                                        • CreateDirectoryW.KERNELBASE(?,00000000), ref: 017CE7A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1741459454.00000000017CD000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17cd000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: AttributesCreateDirectoryFile
                                                        • String ID:
                                                        • API String ID: 3401506121-0
                                                        • Opcode ID: 516061d2a3901029d7a1f462c3b17f0f114a7ce6c6826a2e6b31c4829f33dda1
                                                        • Instruction ID: efaf641cdfec2477e71b7063b22dfd927411412823ce713d4a4bf595a65a826f
                                                        • Opcode Fuzzy Hash: 516061d2a3901029d7a1f462c3b17f0f114a7ce6c6826a2e6b31c4829f33dda1
                                                        • Instruction Fuzzy Hash: F451853191120996EF14EFA0C854BEFB77AEF58700F10956CA609F7290EB399B44C765
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual
                                                        • String ID:
                                                        • API String ID: 544645111-0
                                                        • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction ID: b7388a05acd092c146063079422f1be93cc10a186690ebe2202d57e224d96bf6
                                                        • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                        • Instruction Fuzzy Hash: B731F274A00109DBC718DF69D490969FBB2FF49304B2886A6E80ACB756D735EDD1CBD0
                                                        APIs
                                                          • Part of subcall function 007C4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,007C4EDD,?,00891418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007C4E9C
                                                          • Part of subcall function 007C4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 007C4EAE
                                                          • Part of subcall function 007C4E90: FreeLibrary.KERNEL32(00000000,?,?,007C4EDD,?,00891418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007C4EC0
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00891418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007C4EFD
                                                          • Part of subcall function 007C4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00803CDE,?,00891418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007C4E62
                                                          • Part of subcall function 007C4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 007C4E74
                                                          • Part of subcall function 007C4E59: FreeLibrary.KERNEL32(00000000,?,?,00803CDE,?,00891418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007C4E87
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Library$Load$AddressFreeProc
                                                        • String ID:
                                                        • API String ID: 2632591731-0
                                                        • Opcode ID: ded36f688c4f8f721d340c7ea0670173cb23ac468248f9ad9572c1f4d52b869e
                                                        • Instruction ID: 2ef5f14424b6eed17ece98477c23933e679b092b49d5cdd0444040d6d73d00d4
                                                        • Opcode Fuzzy Hash: ded36f688c4f8f721d340c7ea0670173cb23ac468248f9ad9572c1f4d52b869e
                                                        • Instruction Fuzzy Hash: 8D112332600305EADB10EB60DC2AFAD77A5AF40710F10842DF442E61C1EEB9AA449B90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: __wsopen_s
                                                        • String ID:
                                                        • API String ID: 3347428461-0
                                                        • Opcode ID: cb488dd69ccc24184284455ac54777f00ae5d3461d38e1c4dfeef1f1dd264e29
                                                        • Instruction ID: 0c977caf22b3412f986230ffa549b95e20432214a39e06f3dc072f595c170273
                                                        • Opcode Fuzzy Hash: cb488dd69ccc24184284455ac54777f00ae5d3461d38e1c4dfeef1f1dd264e29
                                                        • Instruction Fuzzy Hash: 5911187590410EAFCB05DF58E9419AE7BF5FF48314F144059F908AB312DB31DA11CBA5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                        • Instruction ID: 45546a8bc570fe10392127206bba3d3268b3180ec5b887669ee8dfe662f4a0f5
                                                        • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                        • Instruction Fuzzy Hash: EEF0F932512A54D7C6313B679C09B6A33989F56334F100B15F620932D2DB7CE80285A6
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID:
                                                        • API String ID: 176396367-0
                                                        • Opcode ID: b66f2ccc6a42f866386a2c3f527481c72d49d8aa6e16cad6a22e3b4c4ac6860b
                                                        • Instruction ID: d74d542f555df04f72bdf4a7d9e329ed24ad942bfb3102e77330feca38911b23
                                                        • Opcode Fuzzy Hash: b66f2ccc6a42f866386a2c3f527481c72d49d8aa6e16cad6a22e3b4c4ac6860b
                                                        • Instruction Fuzzy Hash: 82F0A4B3601600AED7249F39D80AF66BBA4EB44760F10852EF61ADB2D1DB75E51086E0
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000000,?,00891444), ref: 007F3852
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: 25af23fe168060a7cdc5fa170f32f329af7bbf25080e5fe4683ea8483bc26ef9
                                                        • Instruction ID: a4fd2732631dac0ff22c91ca100ef3f7b04b8b3c6f3ae6e853b2fbbc473c8a9e
                                                        • Opcode Fuzzy Hash: 25af23fe168060a7cdc5fa170f32f329af7bbf25080e5fe4683ea8483bc26ef9
                                                        • Instruction Fuzzy Hash: B2E0E53210526CEAE62126779D08BBA3648AB42BF0F090022BE0592780DB1DDD0191F0
                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,?,00891418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007C4F6D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID:
                                                        • API String ID: 3664257935-0
                                                        • Opcode ID: b8691accf1d7ea1b06a1508f3081c44fa4728977a5553eb638d82116deb31764
                                                        • Instruction ID: 5fbd48d89e97c6e2f76f7da1b9427d0e72e52ad64ac658987b502e8432390a92
                                                        • Opcode Fuzzy Hash: b8691accf1d7ea1b06a1508f3081c44fa4728977a5553eb638d82116deb31764
                                                        • Instruction Fuzzy Hash: ACF03971105B52CFDB349F64D4A4E22BBE4BF14329328897EE1EA82621CB399844DF10
                                                        APIs
                                                        • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,?,0080EE51,00883630,00000002), ref: 0082CD26
                                                          • Part of subcall function 0082CC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000000,?,00000000,?,?,?,0082CD19,?,?,?), ref: 0082CC59
                                                          • Part of subcall function 0082CC37: SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000001,?,0082CD19,?,?,?,?,0080EE51,00883630,00000002), ref: 0082CC6E
                                                          • Part of subcall function 0082CC37: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?,0082CD19,?,?,?,?,0080EE51,00883630,00000002), ref: 0082CC7A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: File$Pointer$Write
                                                        • String ID:
                                                        • API String ID: 3847668363-0
                                                        • Opcode ID: c94b4b95b0fd29acc758c72f2ffa3e4dbff1e5827f61b32142971fc94a306a81
                                                        • Instruction ID: 88dfdcc30586e4c75e5556331f4fd7e0b462d3e6eda9c77abb81636c9f8ba110
                                                        • Opcode Fuzzy Hash: c94b4b95b0fd29acc758c72f2ffa3e4dbff1e5827f61b32142971fc94a306a81
                                                        • Instruction Fuzzy Hash: FDE06D7A400714EFC7219F8AED008AABBF8FF84361710852FE996C2110D3B5AA54DF60
                                                        APIs
                                                        • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 007C2DC4
                                                          • Part of subcall function 007C6B57: _wcslen.LIBCMT ref: 007C6B6A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: LongNamePath_wcslen
                                                        • String ID:
                                                        • API String ID: 541455249-0
                                                        • Opcode ID: d701aa78a24bc517e05261061bdbdbd8f16e0f64b9000f72c391208299bbab44
                                                        • Instruction ID: 4debc470f996a3e11a30a9bd83078f4ffbda616f3686f6456bd38a8e89e70e07
                                                        • Opcode Fuzzy Hash: d701aa78a24bc517e05261061bdbdbd8f16e0f64b9000f72c391208299bbab44
                                                        • Instruction Fuzzy Hash: 07E0CD726002245BCB10D6589C09FDA77DDEFC8790F040075FD09E7248DE64AD808551
                                                        APIs
                                                          • Part of subcall function 007C3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 007C3908
                                                          • Part of subcall function 007CD730: GetInputState.USER32 ref: 007CD807
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 007C2B6B
                                                          • Part of subcall function 007C30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 007C314E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                        • String ID:
                                                        • API String ID: 3667716007-0
                                                        • Opcode ID: 916298041e1fb004ef1226405af083069107e2bad4226d4f58115f07c5d28af2
                                                        • Instruction ID: 68e163206d2bfc5a02e74e6600c579bcb78b9f39c1e7479f58926ab4ad24cbc1
                                                        • Opcode Fuzzy Hash: 916298041e1fb004ef1226405af083069107e2bad4226d4f58115f07c5d28af2
                                                        • Instruction Fuzzy Hash: D2E0262230430486CE04BB70985EFBDB38AABD5311F00443EF14383163CE2C898A4351
                                                        APIs
                                                        • GetFileAttributesW.KERNELBASE(?), ref: 017CDECB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1741459454.00000000017CD000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17cd000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: AttributesFile
                                                        • String ID:
                                                        • API String ID: 3188754299-0
                                                        • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                        • Instruction ID: 3e84695289fe198ef49078c1f203fd5e2aba66a8c848c65befab48a197c88509
                                                        • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                        • Instruction Fuzzy Hash: DFE08C30A05208EBDB30CAE8C814AA9B3A8D71D720F0046ACE906C3680D5318A50DA94
                                                        APIs
                                                        • CreateFileW.KERNELBASE(00000000,00000000,?,00800704,?,?,00000000,?,00800704,00000000,0000000C), ref: 008003B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: d2eb18a98d635a953a0ed2615c65e600c1168331c8264732a9e76fbd7bfa57ac
                                                        • Instruction ID: 5d050a0c656f8ed9a8026c00e2989806ecdb4d961cbd6743bfefc38030d6a30f
                                                        • Opcode Fuzzy Hash: d2eb18a98d635a953a0ed2615c65e600c1168331c8264732a9e76fbd7bfa57ac
                                                        • Instruction Fuzzy Hash: D5D06C3204020DBFDF028F84DD06EDA3BAAFB48714F014040BE1856020C736E821AB90
                                                        APIs
                                                        • GetFileAttributesW.KERNELBASE(?), ref: 017CDE9B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1741459454.00000000017CD000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17cd000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: AttributesFile
                                                        • String ID:
                                                        • API String ID: 3188754299-0
                                                        • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                        • Instruction ID: 7a0c70ffc12ec2c30a7fffbf9436b900599ca79d67b8c3a77ca5b306d11d30ca
                                                        • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                        • Instruction Fuzzy Hash: ACD05E3090520CABCB20DAE8D80499AB7A89709320F004768ED1583280D531A9409A94
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 007C1CBC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: InfoParametersSystem
                                                        • String ID:
                                                        • API String ID: 3098949447-0
                                                        • Opcode ID: 7247f474cee23eaaaf44ee1b64d6a6effc902ddcffec0a35d9e4a20e29bc3c98
                                                        • Instruction ID: ad29ef87f67f7163155c2409e449ff87e6ac1f62e69bf18863f76f80ede139d5
                                                        • Opcode Fuzzy Hash: 7247f474cee23eaaaf44ee1b64d6a6effc902ddcffec0a35d9e4a20e29bc3c98
                                                        • Instruction Fuzzy Hash: DAC0923A280305AFF614ABD0BC4EF107764B348B01F488002F60DA96E3D3B62820EA50
                                                        APIs
                                                          • Part of subcall function 007C5745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,007C949C,?,00008000), ref: 007C5773
                                                        • GetLastError.KERNEL32(00000002,00000000), ref: 008376DE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CreateErrorFileLast
                                                        • String ID:
                                                        • API String ID: 1214770103-0
                                                        • Opcode ID: 3359b9341b8eb2c12323b8db8539c0513869a5a05eceebfcc8f91535f53575ce
                                                        • Instruction ID: 4782a2e0fbda9d376fb435293f59a37ed23de730e41d820ae465cd8735fb7711
                                                        • Opcode Fuzzy Hash: 3359b9341b8eb2c12323b8db8539c0513869a5a05eceebfcc8f91535f53575ce
                                                        • Instruction Fuzzy Hash: 44815A70208701DFCB24EF28C4A6B69B7E1FF99314F04451DF8969B2A2DB34E945CB92
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 017CF8B1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1741459454.00000000017CD000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17cd000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                        • Instruction ID: 76739d5aee513873a2e3b316a448a47b58a388348c41d0a2a9a4f9beab63150e
                                                        • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                        • Instruction Fuzzy Hash: 94E0BF7498020EEFDB00EFA8D5496DE7BB4EF04701F1005A5FD05D7681DB309E548A62
                                                        APIs
                                                        • CloseHandle.KERNELBASE(?,?,00000000,008024E0), ref: 007C6266
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CloseHandle
                                                        • String ID:
                                                        • API String ID: 2962429428-0
                                                        • Opcode ID: 72b0c21b444c4ac5040ebdc20aac42df8f15045bd1884db14e308af661fa653b
                                                        • Instruction ID: 6f5200ee6c1f1185245dea44c9a4ff7fb9ae888be54899e32dbd75b0e8c0e61c
                                                        • Opcode Fuzzy Hash: 72b0c21b444c4ac5040ebdc20aac42df8f15045bd1884db14e308af661fa653b
                                                        • Instruction Fuzzy Hash: E4E0BD75800B01CFC3318F1AE844952FBF9FFE13623208A2ED0E692664D3B4688A8F50
                                                        APIs
                                                        • Sleep.KERNELBASE(000001F4), ref: 017CF8B1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1741459454.00000000017CD000.00000040.00000020.00020000.00000000.sdmp, Offset: 017CD000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_17cd000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID:
                                                        • API String ID: 3472027048-0
                                                        • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction ID: a0600b8c10cf459329e2a7cc59d56138adcbb436d9c324bfb76cf9a636f9376f
                                                        • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                        • Instruction Fuzzy Hash: 0AE0E67498020EDFDB00EFB8D54969E7FF4EF04701F100165FD01D2281D6309D508A62
                                                        APIs
                                                          • Part of subcall function 007D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007D9BB2
                                                        • NtdllDialogWndProc_W.NTDLL(?,0000004E,?,?,?,?,?,?), ref: 0085961A
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0085965B
                                                        • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0085969F
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008596C9
                                                        • SendMessageW.USER32 ref: 008596F2
                                                        • GetKeyState.USER32(00000011), ref: 0085978B
                                                        • GetKeyState.USER32(00000009), ref: 00859798
                                                        • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 008597AE
                                                        • GetKeyState.USER32(00000010), ref: 008597B8
                                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 008597E9
                                                        • SendMessageW.USER32 ref: 00859810
                                                        • SendMessageW.USER32(?,00001030,?,00857E95), ref: 00859918
                                                        • SetCapture.USER32(?), ref: 0085994A
                                                        • ClientToScreen.USER32(?,?), ref: 008599AF
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008599D6
                                                        • ReleaseCapture.USER32 ref: 008599E1
                                                        • GetCursorPos.USER32(?), ref: 00859A19
                                                        • ScreenToClient.USER32(?,?), ref: 00859A26
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00859A80
                                                        • SendMessageW.USER32 ref: 00859AAE
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00859AEB
                                                        • SendMessageW.USER32 ref: 00859B1A
                                                        • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00859B3B
                                                        • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00859B4A
                                                        • GetCursorPos.USER32(?), ref: 00859B68
                                                        • ScreenToClient.USER32(?,?), ref: 00859B75
                                                        • GetParent.USER32(?), ref: 00859B93
                                                        • SendMessageW.USER32(?,00001012,00000000,?), ref: 00859BFA
                                                        • SendMessageW.USER32 ref: 00859C2B
                                                        • ClientToScreen.USER32(?,?), ref: 00859C84
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00859CB4
                                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00859CDE
                                                        • SendMessageW.USER32 ref: 00859D01
                                                        • ClientToScreen.USER32(?,?), ref: 00859D4E
                                                        • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00859D82
                                                          • Part of subcall function 007D9944: GetWindowLongW.USER32(?,000000EB), ref: 007D9952
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00859E05
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$ClientScreen$LongWindow$State$CaptureCursorMenuPopupTrack$DialogInvalidateNtdllParentProc_RectRelease
                                                        • String ID: @GUI_DRAGID$F
                                                        • API String ID: 1312020300-4164748364
                                                        • Opcode ID: a6d9fa54f27d8997d7fdb9573dcbc3942dcfb5b78e83cf456ca2b3c1cb65645a
                                                        • Instruction ID: 7495d863705b04013d9cd65f269129a0830b2da7067333c66d2fa462d714347d
                                                        • Opcode Fuzzy Hash: a6d9fa54f27d8997d7fdb9573dcbc3942dcfb5b78e83cf456ca2b3c1cb65645a
                                                        • Instruction Fuzzy Hash: 9C428A34204301EFDB21CF64C948AAABBE5FF58356F14061EFA99C72A1E731A958DF41
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 008548F3
                                                        • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00854908
                                                        • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00854927
                                                        • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0085494B
                                                        • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0085495C
                                                        • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0085497B
                                                        • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 008549AE
                                                        • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 008549D4
                                                        • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00854A0F
                                                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00854A56
                                                        • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00854A7E
                                                        • IsMenu.USER32(?), ref: 00854A97
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00854AF2
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00854B20
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00854B94
                                                        • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00854BE3
                                                        • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00854C82
                                                        • wsprintfW.USER32 ref: 00854CAE
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00854CC9
                                                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00854CF1
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00854D13
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00854D33
                                                        • GetWindowTextW.USER32(?,00000000,00000001), ref: 00854D5A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                        • String ID: %d/%02d/%02d
                                                        • API String ID: 4054740463-328681919
                                                        • Opcode ID: 511e67e86a4fe07e5b5e73b50bf0712fab09effa147d992e2b1ea7ee342c357f
                                                        • Instruction ID: d1f01ec65d889646e4bbe05b457d179a2dfe5ac21c69df3b6d093944e8465031
                                                        • Opcode Fuzzy Hash: 511e67e86a4fe07e5b5e73b50bf0712fab09effa147d992e2b1ea7ee342c357f
                                                        • Instruction Fuzzy Hash: BB12D271500318AFEB258F28CC49FAE7BF4FF45319F105119F916EA2A1DB789989CB50
                                                        APIs
                                                        • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 007DF998
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0081F474
                                                        • IsIconic.USER32(00000000), ref: 0081F47D
                                                        • ShowWindow.USER32(00000000,00000009), ref: 0081F48A
                                                        • SetForegroundWindow.USER32(00000000), ref: 0081F494
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0081F4AA
                                                        • GetCurrentThreadId.KERNEL32 ref: 0081F4B1
                                                        • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0081F4BD
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 0081F4CE
                                                        • AttachThreadInput.USER32(?,00000000,00000001), ref: 0081F4D6
                                                        • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0081F4DE
                                                        • SetForegroundWindow.USER32(00000000), ref: 0081F4E1
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0081F4F6
                                                        • keybd_event.USER32(00000012,00000000), ref: 0081F501
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0081F50B
                                                        • keybd_event.USER32(00000012,00000000), ref: 0081F510
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0081F519
                                                        • keybd_event.USER32(00000012,00000000), ref: 0081F51E
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 0081F528
                                                        • keybd_event.USER32(00000012,00000000), ref: 0081F52D
                                                        • SetForegroundWindow.USER32(00000000), ref: 0081F530
                                                        • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0081F557
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 4125248594-2988720461
                                                        • Opcode ID: adc3e80ab14f2537985b3e29ef81caf63afa988af821e34e49eef7232a3576e0
                                                        • Instruction ID: 4788ae02cdb41e003dd86e4f6a54a942c696b004a71c4ba8466ccbb75e742ea2
                                                        • Opcode Fuzzy Hash: adc3e80ab14f2537985b3e29ef81caf63afa988af821e34e49eef7232a3576e0
                                                        • Instruction Fuzzy Hash: 74315D71A40318BFEB216BB55C4AFBF7EADFB44B51F10006AFA01E61D1D6B45940AEA0
                                                        APIs
                                                          • Part of subcall function 008216C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0082170D
                                                          • Part of subcall function 008216C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0082173A
                                                          • Part of subcall function 008216C3: GetLastError.KERNEL32 ref: 0082174A
                                                        • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00821286
                                                        • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 008212A8
                                                        • CloseHandle.KERNEL32(?), ref: 008212B9
                                                        • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 008212D1
                                                        • GetProcessWindowStation.USER32 ref: 008212EA
                                                        • SetProcessWindowStation.USER32(00000000), ref: 008212F4
                                                        • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00821310
                                                          • Part of subcall function 008210BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,008211FC), ref: 008210D4
                                                          • Part of subcall function 008210BF: CloseHandle.KERNEL32(?,?,008211FC), ref: 008210E9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                        • String ID: $default$winsta0$winsta0\default
                                                        • API String ID: 22674027-1685893292
                                                        • Opcode ID: ad4bab6992e8e4c333a7608cca5ddec34af76030537ba66492d9e7f597cca4f5
                                                        • Instruction ID: 189d737593fb3265f54c5bf4c5e4f8c9a02d118bdda8bc135b7505aaa275f402
                                                        • Opcode Fuzzy Hash: ad4bab6992e8e4c333a7608cca5ddec34af76030537ba66492d9e7f597cca4f5
                                                        • Instruction Fuzzy Hash: 93818C71900318AFDF109FA4EC89BEE7BBAFF14704F244129F915E61A0C7358A84CB65
                                                        APIs
                                                          • Part of subcall function 008210F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00821114
                                                          • Part of subcall function 008210F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00820B9B,?,?,?), ref: 00821120
                                                          • Part of subcall function 008210F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00820B9B,?,?,?), ref: 0082112F
                                                          • Part of subcall function 008210F9: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 00821136
                                                          • Part of subcall function 008210F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0082114D
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00820BCC
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00820C00
                                                        • GetLengthSid.ADVAPI32(?), ref: 00820C17
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00820C51
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00820C6D
                                                        • GetLengthSid.ADVAPI32(?), ref: 00820C84
                                                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00820C8C
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 00820C93
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00820CB4
                                                        • CopySid.ADVAPI32(00000000), ref: 00820CBB
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00820CEA
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00820D0C
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00820D1E
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00820D45
                                                        • HeapFree.KERNEL32(00000000), ref: 00820D4C
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00820D55
                                                        • HeapFree.KERNEL32(00000000), ref: 00820D5C
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00820D65
                                                        • HeapFree.KERNEL32(00000000), ref: 00820D6C
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00820D78
                                                        • HeapFree.KERNEL32(00000000), ref: 00820D7F
                                                          • Part of subcall function 00821193: GetProcessHeap.KERNEL32(00000008,00820BB1,?,00000000,?,00820BB1,?), ref: 008211A1
                                                          • Part of subcall function 00821193: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 008211A8
                                                          • Part of subcall function 00821193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00820BB1,?), ref: 008211B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$Security$Free$AllocateDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                        • String ID:
                                                        • API String ID: 4042927181-0
                                                        • Opcode ID: d54d874cb22441d75da3f9d84193c316e3ba45def43ab320dd0fb61cc4c78d87
                                                        • Instruction ID: 641ec00acecd121221b228d8797cec1371a6dd794b0a548683ee64548230cec5
                                                        • Opcode Fuzzy Hash: d54d874cb22441d75da3f9d84193c316e3ba45def43ab320dd0fb61cc4c78d87
                                                        • Instruction Fuzzy Hash: E671597290131AAFEF10DFA4EC48BAEBBB8FF04311F144615E914E6292D775AA45CF60
                                                        APIs
                                                        • OpenClipboard.USER32(0085CC08), ref: 0083EB29
                                                        • IsClipboardFormatAvailable.USER32(0000000D), ref: 0083EB37
                                                        • GetClipboardData.USER32(0000000D), ref: 0083EB43
                                                        • CloseClipboard.USER32 ref: 0083EB4F
                                                        • GlobalLock.KERNEL32(00000000), ref: 0083EB87
                                                        • CloseClipboard.USER32 ref: 0083EB91
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0083EBBC
                                                        • IsClipboardFormatAvailable.USER32(00000001), ref: 0083EBC9
                                                        • GetClipboardData.USER32(00000001), ref: 0083EBD1
                                                        • GlobalLock.KERNEL32(00000000), ref: 0083EBE2
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0083EC22
                                                        • IsClipboardFormatAvailable.USER32(0000000F), ref: 0083EC38
                                                        • GetClipboardData.USER32(0000000F), ref: 0083EC44
                                                        • GlobalLock.KERNEL32(00000000), ref: 0083EC55
                                                        • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0083EC77
                                                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0083EC94
                                                        • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0083ECD2
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 0083ECF3
                                                        • CountClipboardFormats.USER32 ref: 0083ED14
                                                        • CloseClipboard.USER32 ref: 0083ED59
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                        • String ID:
                                                        • API String ID: 420908878-0
                                                        • Opcode ID: 5862151455efb8e80ae78c75f845a36b356b0dc8c467e95d62dbb2cc02c088c6
                                                        • Instruction ID: e53a546f8c9999e7fcb6413386186fc18c786240257333908dad08d23a8e1097
                                                        • Opcode Fuzzy Hash: 5862151455efb8e80ae78c75f845a36b356b0dc8c467e95d62dbb2cc02c088c6
                                                        • Instruction Fuzzy Hash: B6618734204305AFD310EF24D899F6AB7A4FB84715F14455DF856EB2E2CB39E906CBA2
                                                        APIs
                                                          • Part of subcall function 007D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007D9BB2
                                                        • DragQueryPoint.SHELL32(?,?), ref: 00859147
                                                          • Part of subcall function 00857674: ClientToScreen.USER32(?,?), ref: 0085769A
                                                          • Part of subcall function 00857674: GetWindowRect.USER32(?,?), ref: 00857710
                                                          • Part of subcall function 00857674: PtInRect.USER32(?,?,00858B89), ref: 00857720
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 008591B0
                                                        • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 008591BB
                                                        • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 008591DE
                                                        • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00859225
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 0085923E
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00859255
                                                        • SendMessageW.USER32(?,000000B1,?,?), ref: 00859277
                                                        • DragFinish.SHELL32(?), ref: 0085927E
                                                        • NtdllDialogWndProc_W.NTDLL(?,00000233,?,00000000,?,?,?), ref: 00859371
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientDialogFinishLongNtdllPointProc_Screen
                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                        • API String ID: 4085959399-3440237614
                                                        • Opcode ID: cb4b72dc6cbcd2e4df785767a9bf7b79336b85daf5776a2429464bae7aa1f5b3
                                                        • Instruction ID: b9df979530ebeaa32944a4d3e3553421cc417edf425a0381945d297f1595e5ea
                                                        • Opcode Fuzzy Hash: cb4b72dc6cbcd2e4df785767a9bf7b79336b85daf5776a2429464bae7aa1f5b3
                                                        • Instruction Fuzzy Hash: 9F616C71108301AFC701EF64DC89EAFBBE9FF89751F40091EF695922A1DB349A49CB52
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 008369BE
                                                        • FindClose.KERNEL32(00000000), ref: 00836A12
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00836A4E
                                                        • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00836A75
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00836AB2
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 00836ADF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                        • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                        • API String ID: 3830820486-3289030164
                                                        • Opcode ID: 528648045854a9a64c7e711678696cbf469ee43094dac71d9bdfff856e72f670
                                                        • Instruction ID: 13a79d0c0e8ede26f898829a0e932fa5790bc2b96aec77f9a5c52a65340df2e5
                                                        • Opcode Fuzzy Hash: 528648045854a9a64c7e711678696cbf469ee43094dac71d9bdfff856e72f670
                                                        • Instruction Fuzzy Hash: 86D14072508344AEC314EBA4C889EABB7ECFF88704F04491DF585D7291EB78DA44CB62
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00839663
                                                        • GetFileAttributesW.KERNEL32(?), ref: 008396A1
                                                        • SetFileAttributesW.KERNEL32(?,?), ref: 008396BB
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 008396D3
                                                        • FindClose.KERNEL32(00000000), ref: 008396DE
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 008396FA
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 0083974A
                                                        • SetCurrentDirectoryW.KERNEL32(00886B7C), ref: 00839768
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 00839772
                                                        • FindClose.KERNEL32(00000000), ref: 0083977F
                                                        • FindClose.KERNEL32(00000000), ref: 0083978F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                        • String ID: *.*
                                                        • API String ID: 1409584000-438819550
                                                        • Opcode ID: 421aa47c148791589dc627f242d3916e2e33d2fd84a34e030788c84d137eb0da
                                                        • Instruction ID: 8c1203cdcf71c2b285037030e75e581a967151d7c819585205e83cd7fd5d188b
                                                        • Opcode Fuzzy Hash: 421aa47c148791589dc627f242d3916e2e33d2fd84a34e030788c84d137eb0da
                                                        • Instruction Fuzzy Hash: 2E31DF3264131AAEDB10AFB4DC49ADE37ACFF89321F104055E955E21A0EBB8DE448E90
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 008397BE
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00839819
                                                        • FindClose.KERNEL32(00000000), ref: 00839824
                                                        • FindFirstFileW.KERNEL32(*.*,?), ref: 00839840
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00839890
                                                        • SetCurrentDirectoryW.KERNEL32(00886B7C), ref: 008398AE
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 008398B8
                                                        • FindClose.KERNEL32(00000000), ref: 008398C5
                                                        • FindClose.KERNEL32(00000000), ref: 008398D5
                                                          • Part of subcall function 0082DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0082DB00
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                        • String ID: *.*
                                                        • API String ID: 2640511053-438819550
                                                        • Opcode ID: 6f1178124a721a8f52b334c02247c60d2dafa025c82928853da0e31eff09bea3
                                                        • Instruction ID: 449ec07277ee5a4cdeea5c1978d4eee385714cd02eadaa958147d32036fdcebf
                                                        • Opcode Fuzzy Hash: 6f1178124a721a8f52b334c02247c60d2dafa025c82928853da0e31eff09bea3
                                                        • Instruction Fuzzy Hash: 3231B33150131D6EDB10AFA4DC48ADE77ACFF86325F104165E990E21A0DBB9DD44CFA0
                                                        APIs
                                                        • GetLocalTime.KERNEL32(?), ref: 00838257
                                                        • SystemTimeToFileTime.KERNEL32(?,?), ref: 00838267
                                                        • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00838273
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00838310
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00838324
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00838356
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0083838C
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00838395
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectoryTime$File$Local$System
                                                        • String ID: *.*
                                                        • API String ID: 1464919966-438819550
                                                        • Opcode ID: c012daf3be93b75bb081c6a62725340d7cfadb23f7864bec8b3d1010998640e0
                                                        • Instruction ID: 80521cf6fc8dd3a4c1a98dc36ca99412a0248162cc372135e43c3ebea490ea4e
                                                        • Opcode Fuzzy Hash: c012daf3be93b75bb081c6a62725340d7cfadb23f7864bec8b3d1010998640e0
                                                        • Instruction Fuzzy Hash: 336145725043459FCB10EF64D845AAEB3E8FF89314F04892EF989C7251EB39E945CB92
                                                        APIs
                                                          • Part of subcall function 007C3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007C3A97,?,?,007C2E7F,?,?,?,00000000), ref: 007C3AC2
                                                          • Part of subcall function 0082E199: GetFileAttributesW.KERNEL32(?,0082CF95), ref: 0082E19A
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0082D122
                                                        • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0082D1DD
                                                        • MoveFileW.KERNEL32(?,?), ref: 0082D1F0
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 0082D20D
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0082D237
                                                          • Part of subcall function 0082D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0082D21C,?,?), ref: 0082D2B2
                                                        • FindClose.KERNEL32(00000000,?,?,?), ref: 0082D253
                                                        • FindClose.KERNEL32(00000000), ref: 0082D264
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 1946585618-1173974218
                                                        • Opcode ID: 53be7b2de0f234d80b0f58f123d158bd9774cd0b7520e9e9855055d5fcec932d
                                                        • Instruction ID: 9fe4b491271b290dcad34dc5d42572d1cca295e1e6d1081bed61c7cd83211849
                                                        • Opcode Fuzzy Hash: 53be7b2de0f234d80b0f58f123d158bd9774cd0b7520e9e9855055d5fcec932d
                                                        • Instruction Fuzzy Hash: E4613B3180121DEACF05EBA0E956EEDBBB5FF15305F208169E401B7191EB35AF49CB61
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                        • String ID:
                                                        • API String ID: 1737998785-0
                                                        • Opcode ID: 8a3ad0285dc6578a30760375817dbb3ada58b0cdfd284bb22d55836e2310fca2
                                                        • Instruction ID: fb1518ab664c1fdc34a772a98ec5f27192b69b53bafff1a7ba1903821226887f
                                                        • Opcode Fuzzy Hash: 8a3ad0285dc6578a30760375817dbb3ada58b0cdfd284bb22d55836e2310fca2
                                                        • Instruction Fuzzy Hash: D5415A35604611AFE721DF19D888B2ABBE5FF84319F14809DE4198B6A2C779ED42CBD0
                                                        APIs
                                                          • Part of subcall function 008216C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0082170D
                                                          • Part of subcall function 008216C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0082173A
                                                          • Part of subcall function 008216C3: GetLastError.KERNEL32 ref: 0082174A
                                                        • ExitWindowsEx.USER32(?,00000000), ref: 0082E932
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                        • String ID: $ $@$SeShutdownPrivilege
                                                        • API String ID: 2234035333-3163812486
                                                        • Opcode ID: 8dcf975e2b9081bf01cfdfed69f9e263a867fd40f78e9c567a917a2081925c78
                                                        • Instruction ID: 5071fd7efcbfa037d2953aaceb0d7643c6aeea112462caad5b8c042c399538a1
                                                        • Opcode Fuzzy Hash: 8dcf975e2b9081bf01cfdfed69f9e263a867fd40f78e9c567a917a2081925c78
                                                        • Instruction Fuzzy Hash: E8012672610334AFEF1426B8BC8ABBF765CF714745F150423FC12E21D1E6A45CC08698
                                                        APIs
                                                        • socket.WS2_32(00000002,00000001,00000006), ref: 00841276
                                                        • WSAGetLastError.WS2_32 ref: 00841283
                                                        • bind.WS2_32(00000000,?,00000010), ref: 008412BA
                                                        • WSAGetLastError.WS2_32 ref: 008412C5
                                                        • closesocket.WS2_32(00000000), ref: 008412F4
                                                        • listen.WS2_32(00000000,00000005), ref: 00841303
                                                        • WSAGetLastError.WS2_32 ref: 0084130D
                                                        • closesocket.WS2_32(00000000), ref: 0084133C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$closesocket$bindlistensocket
                                                        • String ID:
                                                        • API String ID: 540024437-0
                                                        • Opcode ID: ee114477ed51f96e788c5a25685bf25330169b9f89dfd50a8cbc2c02eb8296cd
                                                        • Instruction ID: e31c1f9b46b11e0b3bc09208e31a0e3681fe6d348abf86600727df05a71ed020
                                                        • Opcode Fuzzy Hash: ee114477ed51f96e788c5a25685bf25330169b9f89dfd50a8cbc2c02eb8296cd
                                                        • Instruction Fuzzy Hash: 0F416C316002149FDB10DF64C488B2ABBE5FF46319F18819CE856CB392C775EC81CBA1
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,?,?,00000000), ref: 008282AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: lstrlen
                                                        • String ID: ($AddRef$InterfaceDispatch$QueryInterface$Release$|
                                                        • API String ID: 1659193697-2318614619
                                                        • Opcode ID: 334e1117a8f962af93f9658f1542c4421b1c5a31e17dccb8d09b1962c5bba40f
                                                        • Instruction ID: 5fd54d3f3e2a233959e17e8c95f6f0ab3db150e36e67f9bbeee596cd98948580
                                                        • Opcode Fuzzy Hash: 334e1117a8f962af93f9658f1542c4421b1c5a31e17dccb8d09b1962c5bba40f
                                                        • Instruction Fuzzy Hash: 8B323474A01615DFCB28CF59D484A6AB7F0FF48710B15C46EE49ADB3A1EB70E981CB44
                                                        APIs
                                                          • Part of subcall function 007C3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007C3A97,?,?,007C2E7F,?,?,?,00000000), ref: 007C3AC2
                                                          • Part of subcall function 0082E199: GetFileAttributesW.KERNEL32(?,0082CF95), ref: 0082E19A
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0082D420
                                                        • DeleteFileW.KERNEL32(?,?,?,?), ref: 0082D470
                                                        • FindNextFileW.KERNEL32(00000000,00000010), ref: 0082D481
                                                        • FindClose.KERNEL32(00000000), ref: 0082D498
                                                        • FindClose.KERNEL32(00000000), ref: 0082D4A1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                        • String ID: \*.*
                                                        • API String ID: 2649000838-1173974218
                                                        • Opcode ID: 8878c4efaeb4579f558225a7215ee8c41bf5bd50107d4c0ede958c7ac6a05a26
                                                        • Instruction ID: 615641e02b6d5943bc765685a787c11ed9b49c04e975da90cbdd587b567bf55b
                                                        • Opcode Fuzzy Hash: 8878c4efaeb4579f558225a7215ee8c41bf5bd50107d4c0ede958c7ac6a05a26
                                                        • Instruction Fuzzy Hash: E9318D31008355AFC200EF64D89ADAFBBE8FE91305F404A1DF4D593191EB38AA098B67
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: __floor_pentium4
                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                        • API String ID: 4168288129-2761157908
                                                        • Opcode ID: c5deeb7c77019a7774bbe88b8a3b5b5c4587b165bb169d06e2f2a11e16b92876
                                                        • Instruction ID: 5969104409e1c4813c0d08e527fed1c62a003be1c4700c6778469268557cdac6
                                                        • Opcode Fuzzy Hash: c5deeb7c77019a7774bbe88b8a3b5b5c4587b165bb169d06e2f2a11e16b92876
                                                        • Instruction Fuzzy Hash: E9C23972E0862C8FDB25DE289D447EAB7B5EF48304F1441EAD54DE7251EB78AE818F40
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 008364DC
                                                        • CoInitialize.OLE32(00000000), ref: 00836639
                                                        • CoCreateInstance.COMBASE(0085FCF8,00000000,00000001,0085FB68,?), ref: 00836650
                                                        • CoUninitialize.COMBASE ref: 008368D4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 886957087-24824748
                                                        • Opcode ID: 31f2894ce55d5ad20f56e57927791b395bfc06f935320e506ec009d4f67253d9
                                                        • Instruction ID: 7884699bc9dbb1309ca1fcbc40d1f855f8448ad8baa7ef460a9ca958ba153c3f
                                                        • Opcode Fuzzy Hash: 31f2894ce55d5ad20f56e57927791b395bfc06f935320e506ec009d4f67253d9
                                                        • Instruction Fuzzy Hash: 40D13971508201AFC314EF24C885E6BB7E8FF98704F14896DF595CB291EB74E945CBA2
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,?,00000000), ref: 008422E8
                                                          • Part of subcall function 0083E4EC: GetWindowRect.USER32(?,?), ref: 0083E504
                                                        • GetDesktopWindow.USER32 ref: 00842312
                                                        • GetWindowRect.USER32(00000000), ref: 00842319
                                                        • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00842355
                                                        • GetCursorPos.USER32(?), ref: 00842381
                                                        • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 008423DF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                        • String ID:
                                                        • API String ID: 2387181109-0
                                                        • Opcode ID: dd9985e5f5a9c662794e70c46682f5fa83c8b5e0c6fbeb9c4fe3f70b4ae4e12e
                                                        • Instruction ID: 810de2bb071db58134cd9a79b7a1d84c68972a2eb8331a1207d564cb2832a679
                                                        • Opcode Fuzzy Hash: dd9985e5f5a9c662794e70c46682f5fa83c8b5e0c6fbeb9c4fe3f70b4ae4e12e
                                                        • Instruction Fuzzy Hash: 2031DE72508319AFC720DF58D849B5BBBA9FF88314F400919F985D7291DB34EA48CB96
                                                        APIs
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                        • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00839B78
                                                        • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00839C8B
                                                          • Part of subcall function 00833874: GetInputState.USER32 ref: 008338CB
                                                          • Part of subcall function 00833874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00833966
                                                        • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00839BA8
                                                        • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00839C75
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                        • String ID: *.*
                                                        • API String ID: 1972594611-438819550
                                                        • Opcode ID: 57789a678bfeef2cd05d12d794884c8545b8c53a9f2f46c0c695dda6a5a44b4b
                                                        • Instruction ID: 69db7511985cfd3faa8176fa24c7d23496105801718cfbc4fbe21910bf6d2b42
                                                        • Opcode Fuzzy Hash: 57789a678bfeef2cd05d12d794884c8545b8c53a9f2f46c0c695dda6a5a44b4b
                                                        • Instruction Fuzzy Hash: 1041607190420A9FCF14DF64C889AEEBBB8FF45311F144159E855E2191EB749E85CFA0
                                                        APIs
                                                          • Part of subcall function 007D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007D9BB2
                                                        • NtdllDialogWndProc_W.NTDLL(?,?,?,?,?), ref: 007D9A4E
                                                        • GetSysColor.USER32(0000000F), ref: 007D9B23
                                                        • SetBkColor.GDI32(?,00000000), ref: 007D9B36
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Color$DialogLongNtdllProc_Window
                                                        • String ID:
                                                        • API String ID: 1958858920-0
                                                        • Opcode ID: 9a1fc3f79f46ad1b95f674a0a4bbb3676a9e2d975e24e7bf8a9a3190ed163666
                                                        • Instruction ID: 1b73b3625ebed584ce1ae6604f681e1587e7f5820f09ef493e7543b32790ef7d
                                                        • Opcode Fuzzy Hash: 9a1fc3f79f46ad1b95f674a0a4bbb3676a9e2d975e24e7bf8a9a3190ed163666
                                                        • Instruction Fuzzy Hash: 26A1F871208544FEE725AA2C8C5DDBB2ABDFF82340F19421FF602D67D1DA299D41D272
                                                        APIs
                                                          • Part of subcall function 0084304E: inet_addr.WS2_32(?), ref: 0084307A
                                                          • Part of subcall function 0084304E: _wcslen.LIBCMT ref: 0084309B
                                                        • socket.WS2_32(00000002,00000002,00000011), ref: 0084185D
                                                        • WSAGetLastError.WS2_32 ref: 00841884
                                                        • bind.WS2_32(00000000,?,00000010), ref: 008418DB
                                                        • WSAGetLastError.WS2_32 ref: 008418E6
                                                        • closesocket.WS2_32(00000000), ref: 00841915
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 1601658205-0
                                                        • Opcode ID: cb45130ad59baa3d4e1393182a67fa0e133b4eb07b365f6bfa3cfe061c4dceb6
                                                        • Instruction ID: 61198057010e9236d6574a5c344dcb625fd313f0edb6d14203b91329a2a66c33
                                                        • Opcode Fuzzy Hash: cb45130ad59baa3d4e1393182a67fa0e133b4eb07b365f6bfa3cfe061c4dceb6
                                                        • Instruction Fuzzy Hash: 1951A271A00214AFDB10AF24C88AF2A7BE5EB45718F08805CF9069F3D3CB75AD41CBA1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                        • String ID:
                                                        • API String ID: 292994002-0
                                                        • Opcode ID: f3a908fe42a7a944b9de757fdc867eef502794e802d132f4a39e9c47dcf87350
                                                        • Instruction ID: a2c8ba8d8b7389793ea3d61c618eb7c2403768451809dc1f898e63d3d1324611
                                                        • Opcode Fuzzy Hash: f3a908fe42a7a944b9de757fdc867eef502794e802d132f4a39e9c47dcf87350
                                                        • Instruction Fuzzy Hash: 3B2180317402119FDB218F1AC888F6A7BA5FF95316B19805CEC4ACB351DB76ED46CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                        • API String ID: 0-1546025612
                                                        • Opcode ID: d5db4372e0aee6701f3b6b3dd530d48b965a06d5988562dca25ebcf03d5abf77
                                                        • Instruction ID: 855aa1bd3fe9e0a5295425c7cbfc0bcbb782bcc33d7bb17cdbd45d181824176f
                                                        • Opcode Fuzzy Hash: d5db4372e0aee6701f3b6b3dd530d48b965a06d5988562dca25ebcf03d5abf77
                                                        • Instruction Fuzzy Hash: 23A26D70A0061ACBDFA4CF58C844BAEB7B1FB54310F2481AED815E7285EB749D91CF91
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0084A6AC
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0084A6BA
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 0084A79C
                                                        • CloseHandle.KERNEL32(00000000), ref: 0084A7AB
                                                          • Part of subcall function 007DCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00803303,?), ref: 007DCE8A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                        • String ID:
                                                        • API String ID: 1991900642-0
                                                        • Opcode ID: d8855e72a99b6e449a08ab05814fdfda491b5d7c1d4581685b50cbd96ea6e1c4
                                                        • Instruction ID: 523f56c5f873a8b90e4cba52363b5b4912c4fe2d6dc45e9f15c2af0e2b729e7d
                                                        • Opcode Fuzzy Hash: d8855e72a99b6e449a08ab05814fdfda491b5d7c1d4581685b50cbd96ea6e1c4
                                                        • Instruction Fuzzy Hash: 03511971508700AFD714EF24D88AE6BBBE8FF89754F40492DF58597251EB34E904CB92
                                                        APIs
                                                        • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0082AAAC
                                                        • SetKeyboardState.USER32(00000080), ref: 0082AAC8
                                                        • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0082AB36
                                                        • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0082AB88
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: 7961dd6c03edbb8bbcabffe87d8a2aaec5cc53b7caf6bcd33daf9b3c5cfc52c7
                                                        • Instruction ID: a02fd9947cc954108be2aa766d480f81aafd8a272a73d776fd8b9a39641ec691
                                                        • Opcode Fuzzy Hash: 7961dd6c03edbb8bbcabffe87d8a2aaec5cc53b7caf6bcd33daf9b3c5cfc52c7
                                                        • Instruction Fuzzy Hash: C031E574A40368AFEB398A68AC05BFA7BA6FF54330F04421AE581D61D1D37589C5CB62
                                                        APIs
                                                        • _free.LIBCMT ref: 007FBB7F
                                                          • Part of subcall function 007F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007FD7D1,00000000,00000000,00000000,00000000,?,007FD7F8,00000000,00000007,00000000,?,007FDBF5,00000000), ref: 007F29DE
                                                          • Part of subcall function 007F29C8: GetLastError.KERNEL32(00000000,?,007FD7D1,00000000,00000000,00000000,00000000,?,007FD7F8,00000000,00000007,00000000,?,007FDBF5,00000000,00000000), ref: 007F29F0
                                                        • GetTimeZoneInformation.KERNEL32 ref: 007FBB91
                                                        • WideCharToMultiByte.KERNEL32(00000000,?,0089121C,000000FF,?,0000003F,?,?), ref: 007FBC09
                                                        • WideCharToMultiByte.KERNEL32(00000000,?,00891270,000000FF,?,0000003F,?,?,?,0089121C,000000FF,?,0000003F,?,?), ref: 007FBC36
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                        • String ID:
                                                        • API String ID: 806657224-0
                                                        • Opcode ID: ddaa046f71b02b5b267c9a814e8565d8a314caa3e4bb9bd44d393852ed44a690
                                                        • Instruction ID: 6c345f9377ca8592ac555404f0f6a9fe779eeec7171c4f88d76ca16af24d69d3
                                                        • Opcode Fuzzy Hash: ddaa046f71b02b5b267c9a814e8565d8a314caa3e4bb9bd44d393852ed44a690
                                                        • Instruction Fuzzy Hash: 4C31AF7094820ADFCF11EFA9DC8487ABBB8FF4575071842AAE261DB3A1D7349D00CB60
                                                        APIs
                                                          • Part of subcall function 007D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007D9BB2
                                                        • GetCursorPos.USER32(?), ref: 00859001
                                                        • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00817711,?,?,?,?,?), ref: 00859016
                                                        • GetCursorPos.USER32(?), ref: 0085905E
                                                        • NtdllDialogWndProc_W.NTDLL(?,0000007B,?,?,?,?,?,?,?,?,?,?,00817711,?,?,?), ref: 00859094
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Cursor$DialogLongMenuNtdllPopupProc_TrackWindow
                                                        • String ID:
                                                        • API String ID: 1423138444-0
                                                        • Opcode ID: e14fd1bd24b8d8e3f5b4b5ebae8a5a7e80222a81d2d1d94d0521e65e5371bce3
                                                        • Instruction ID: c69c3879374902e2e466c2d9886451ff89435fbb8b47fa7ac6ced40be3fa3961
                                                        • Opcode Fuzzy Hash: e14fd1bd24b8d8e3f5b4b5ebae8a5a7e80222a81d2d1d94d0521e65e5371bce3
                                                        • Instruction Fuzzy Hash: 0221BF31600518EFCF268F94CC58EEB7BF9FB89352F044465F945872A1D335A950EB60
                                                        APIs
                                                        • InternetReadFile.WININET(?,?,00000400,?), ref: 0083CE89
                                                        • GetLastError.KERNEL32(?,00000000), ref: 0083CEEA
                                                        • SetEvent.KERNEL32(?,?,00000000), ref: 0083CEFE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorEventFileInternetLastRead
                                                        • String ID:
                                                        • API String ID: 234945975-0
                                                        • Opcode ID: b535c7682fb65502e2e959284d3cbc0728677a38c14fad6664eeae7ff0868bbd
                                                        • Instruction ID: 5eba52340d0fc9f931780444160074eef5f12488900a4afcc3e2f90fd306d652
                                                        • Opcode Fuzzy Hash: b535c7682fb65502e2e959284d3cbc0728677a38c14fad6664eeae7ff0868bbd
                                                        • Instruction Fuzzy Hash: 42219DB1500705DFD720DF65C948BA677F8FB80759F10481EE546E2151EB74EE058BA4
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,00805222), ref: 0082DBCE
                                                        • GetFileAttributesW.KERNEL32(?), ref: 0082DBDD
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0082DBEE
                                                        • FindClose.KERNEL32(00000000), ref: 0082DBFA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: FileFind$AttributesCloseFirstlstrlen
                                                        • String ID:
                                                        • API String ID: 2695905019-0
                                                        • Opcode ID: ca123e6a1e36eccb304da8b35d25193fe099bc7dea26776daafd0a8366402a3c
                                                        • Instruction ID: ff9a2ccd413a4dff525b7b8cbdc600ba942d61089b49f7d392c5eb97ffda219b
                                                        • Opcode Fuzzy Hash: ca123e6a1e36eccb304da8b35d25193fe099bc7dea26776daafd0a8366402a3c
                                                        • Instruction Fuzzy Hash: ABF0A030810B245B82206B78AC0D8AA3BACFF01336B104702F836D22E0EBB45994CA96
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00835CC1
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 00835D17
                                                        • FindClose.KERNEL32(?), ref: 00835D5F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Find$File$CloseFirstNext
                                                        • String ID:
                                                        • API String ID: 3541575487-0
                                                        • Opcode ID: 19315a11e56456dc13da6fdd5fce954c26f00210c481ee1c1bec4785d44a9191
                                                        • Instruction ID: 1105f6ec51c421ccc5d586200b0f04816739a7d7706ddbae902bc132fe05ee9f
                                                        • Opcode Fuzzy Hash: 19315a11e56456dc13da6fdd5fce954c26f00210c481ee1c1bec4785d44a9191
                                                        • Instruction Fuzzy Hash: B7517675604A019FC714DF28C498E9AB7E4FF89328F14856EE95ACB3A1CB34ED05CB91
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32 ref: 007F271A
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 007F2724
                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 007F2731
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                        • String ID:
                                                        • API String ID: 3906539128-0
                                                        • Opcode ID: 10ebc894270e1cf23958aa9440172fbd19f18fc6110de857bbe4e9572936bc2f
                                                        • Instruction ID: d3409b1ffeda1eb06b8e2ccdcd170fff83586d350365fc7d66be42ba85b96cd4
                                                        • Opcode Fuzzy Hash: 10ebc894270e1cf23958aa9440172fbd19f18fc6110de857bbe4e9572936bc2f
                                                        • Instruction Fuzzy Hash: EC31C27490131CEBCB21DF69DC88798BBB8BF08310F5041EAE90CA6261E7749F818F55
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 008351DA
                                                        • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00835238
                                                        • SetErrorMode.KERNEL32(00000000), ref: 008352A1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DiskFreeSpace
                                                        • String ID:
                                                        • API String ID: 1682464887-0
                                                        • Opcode ID: 3017614cd26208f5ee0d7ff95665261f4a420692098b377ab5caf284ab1825f3
                                                        • Instruction ID: b4a7c69fe31ad45d214a0b248457badc58ee157461de6ac5e7cabe4c04b15324
                                                        • Opcode Fuzzy Hash: 3017614cd26208f5ee0d7ff95665261f4a420692098b377ab5caf284ab1825f3
                                                        • Instruction Fuzzy Hash: B6313075A00618DFDB00DF54D888FAEBBB5FF49314F088099E8059B352DB35E856CB91
                                                        APIs
                                                          • Part of subcall function 007DFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 007E0668
                                                          • Part of subcall function 007DFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 007E0685
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0082170D
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0082173A
                                                        • GetLastError.KERNEL32 ref: 0082174A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                        • String ID:
                                                        • API String ID: 577356006-0
                                                        • Opcode ID: 4752908ab6e780e0fae67314c4fc3962a1932e82cb5f882bcfe38f648ff0f78f
                                                        • Instruction ID: c5c4bebdd359da7738e28f175c0f787eef01f1c78b5dbc3fa96756cf843a8d3f
                                                        • Opcode Fuzzy Hash: 4752908ab6e780e0fae67314c4fc3962a1932e82cb5f882bcfe38f648ff0f78f
                                                        • Instruction Fuzzy Hash: 1E11C4B1500308AFD7189F54EC8AD6BB7F9FB44714B20852EE05693241EB74BC418A20
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0082D608
                                                        • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0082D645
                                                        • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0082D650
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CloseControlCreateDeviceFileHandle
                                                        • String ID:
                                                        • API String ID: 33631002-0
                                                        • Opcode ID: 908b57d00a773d566cfa060b9d8cc19afa5c85d2f184e77ffdfafcfd60531cb1
                                                        • Instruction ID: 8ca2fb64506ee0136a5deb8e8dc1e0e369a1d18b870986b2ad6dbcb79faf95ea
                                                        • Opcode Fuzzy Hash: 908b57d00a773d566cfa060b9d8cc19afa5c85d2f184e77ffdfafcfd60531cb1
                                                        • Instruction Fuzzy Hash: B2115A75A01328BFDB108B94AC44BAFBFBCEB45B50F108111F914E7290C2744A018BE1
                                                        APIs
                                                        • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0082168C
                                                        • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 008216A1
                                                        • FreeSid.ADVAPI32(?), ref: 008216B1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                        • String ID:
                                                        • API String ID: 3429775523-0
                                                        • Opcode ID: 88633034a830d78e39222853eed5c69aae2afe0f298de041f93ca422e5f8d130
                                                        • Instruction ID: 9d117cfbce64223219f6fad3f8e8cda687736454418c79dfb69858b7830316e9
                                                        • Opcode Fuzzy Hash: 88633034a830d78e39222853eed5c69aae2afe0f298de041f93ca422e5f8d130
                                                        • Instruction Fuzzy Hash: 30F0F471950309FFDF00DFE49C89AAEBBBCFB08606F504565E501E2181E774AA448A50
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(007F28E9,?,007E4CBE,007F28E9,008888B8,0000000C,007E4E15,007F28E9,00000002,00000000,?,007F28E9), ref: 007E4D09
                                                        • TerminateProcess.KERNEL32(00000000,?,007E4CBE,007F28E9,008888B8,0000000C,007E4E15,007F28E9,00000002,00000000,?,007F28E9), ref: 007E4D10
                                                        • ExitProcess.KERNEL32 ref: 007E4D22
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID:
                                                        • API String ID: 1703294689-0
                                                        • Opcode ID: a96f1d5e7553ab0fc3254b67230d91c62c2f0c21eb247eb8758fc0829c45234b
                                                        • Instruction ID: 4d675a6f6074e444ac3f4da08f511a38663f9cd9817dd074c722d9faf71263d5
                                                        • Opcode Fuzzy Hash: a96f1d5e7553ab0fc3254b67230d91c62c2f0c21eb247eb8758fc0829c45234b
                                                        • Instruction Fuzzy Hash: 0CE09231101688AFCB11AF65DD09A983B69FB85782B104054FA058A222CB39D942CA80
                                                        APIs
                                                        • GetUserNameW.ADVAPI32(?,?), ref: 0081D28C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: NameUser
                                                        • String ID: X64
                                                        • API String ID: 2645101109-893830106
                                                        • Opcode ID: 3f6fc09f3eb1d1cdebf608075141b4334536ab542e9a732197ccb1418ee70475
                                                        • Instruction ID: 56d72ad8b44ce74ed4dcec98351b227a4968666cccc3ed16a6f493636c2dca3d
                                                        • Opcode Fuzzy Hash: 3f6fc09f3eb1d1cdebf608075141b4334536ab542e9a732197ccb1418ee70475
                                                        • Instruction Fuzzy Hash: 7ED0C9B480121DEECF90CB90DC88DD9B3BCFB14305F100152F106E2140D77895488F10
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                        • Instruction ID: dbe4d6b337ddd621e0805d54e63a0751eb1e42788515ae04d0a86829f8a7c18f
                                                        • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                        • Instruction Fuzzy Hash: C0024D76E012599FDF15CFA9C8806ADFBF1FF48314F258169E919EB380D735A9028B90
                                                        APIs
                                                          • Part of subcall function 007D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007D9BB2
                                                          • Part of subcall function 007D9944: GetWindowLongW.USER32(?,000000EB), ref: 007D9952
                                                        • GetParent.USER32(?), ref: 008173A3
                                                        • NtdllDialogWndProc_W.NTDLL(?,00000133,?,?,?,?), ref: 0081742D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$DialogNtdllParentProc_
                                                        • String ID:
                                                        • API String ID: 314495775-0
                                                        • Opcode ID: df718de3df36a6db771ce72270df4d368e151cdbb7436308886fb9aa8ccedff5
                                                        • Instruction ID: 70a4d66e6abbfffae147f5efdd7fd2545d0923b45d3733f55989cadee6d0d97f
                                                        • Opcode Fuzzy Hash: df718de3df36a6db771ce72270df4d368e151cdbb7436308886fb9aa8ccedff5
                                                        • Instruction Fuzzy Hash: DD219134604104AFCB259F68CC59DE93BB9FF46370F14425AFA268B3A1D3359D91EA50
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 00836918
                                                        • FindClose.KERNEL32(00000000), ref: 00836961
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: 58a7cb9e7f025397e480358d3c91c64d0e48f084175e1544cd5bb21d47a2f919
                                                        • Instruction ID: ad3a254000084adc0876b2f50f9d1c212c33c4a503dc35e345705abc8a4fa975
                                                        • Opcode Fuzzy Hash: 58a7cb9e7f025397e480358d3c91c64d0e48f084175e1544cd5bb21d47a2f919
                                                        • Instruction Fuzzy Hash: 7D117C31604200AFC710DF29D488B16BBE5FF85329F14C69DE8698B6A2DB34EC05CB91
                                                        APIs
                                                          • Part of subcall function 007D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007D9BB2
                                                        • NtdllDialogWndProc_W.NTDLL(?,0000002B,?,?,?,?,?,?,?,0081769C,?,?,?), ref: 00859111
                                                          • Part of subcall function 007D9944: GetWindowLongW.USER32(?,000000EB), ref: 007D9952
                                                        • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 008590F7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$DialogMessageNtdllProc_Send
                                                        • String ID:
                                                        • API String ID: 1273190321-0
                                                        • Opcode ID: e5ff27802a1eefceaa1ab0d1b2cef7d9318ac9456a95e7ef4612bac8da4562e1
                                                        • Instruction ID: 634a5533c94c90c696447fa77a1d93c20ebc42451757aa8c3e7225491764eda3
                                                        • Opcode Fuzzy Hash: e5ff27802a1eefceaa1ab0d1b2cef7d9318ac9456a95e7ef4612bac8da4562e1
                                                        • Instruction Fuzzy Hash: A301FC30204618EBDB21AF14DC49FA63BB2FB853A6F040069FE814A2E0CB366809DB10
                                                        APIs
                                                        • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00844891,?,?,00000035,?), ref: 008337E4
                                                        • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00844891,?,?,00000035,?), ref: 008337F4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorFormatLastMessage
                                                        • String ID:
                                                        • API String ID: 3479602957-0
                                                        • Opcode ID: cf303e771c335f8a998dd1aecb0c59463ce16ad55978c9eb5dad978ce7fdc447
                                                        • Instruction ID: 546a499f8df207b88de0e17828b69375eca521a82fe90ac08822eb561bd65a1f
                                                        • Opcode Fuzzy Hash: cf303e771c335f8a998dd1aecb0c59463ce16ad55978c9eb5dad978ce7fdc447
                                                        • Instruction Fuzzy Hash: 30F0E5B06043296AEB6017768C4DFEB3BAEFFC4761F000179F609D2291D9609904CBF0
                                                        APIs
                                                        • ClientToScreen.USER32(?,?), ref: 00859423
                                                        • NtdllDialogWndProc_W.NTDLL(?,00000200,?,00000000,?,?,00000000,00000000,?,0081776C,?,?,?,?,?), ref: 0085944C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ClientDialogNtdllProc_Screen
                                                        • String ID:
                                                        • API String ID: 3420055661-0
                                                        • Opcode ID: 2d59e98b8b76d31a1f7578cad0f3e48b31d53a4955c0b5267726ab02cc3400b6
                                                        • Instruction ID: 89bc4721c5e42a89d5a46da3ed1b4d503f76a88266f73a4df4c03403d97a3242
                                                        • Opcode Fuzzy Hash: 2d59e98b8b76d31a1f7578cad0f3e48b31d53a4955c0b5267726ab02cc3400b6
                                                        • Instruction Fuzzy Hash: 59F03A72400218FFEF058F91DC09DAE7FB8FB44352F00405AF945A2160D375AA54DBA0
                                                        APIs
                                                        • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0082B25D
                                                        • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 0082B270
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: InputSendkeybd_event
                                                        • String ID:
                                                        • API String ID: 3536248340-0
                                                        • Opcode ID: 7203c404b4134019538a385ef0c67f8396eb36deb092c1b1c0b5e07b5e63e5ab
                                                        • Instruction ID: 70e296ba3ac1022db4c4ea49949c0891c8b6b2d659e79fa57c9789c6e2d2e816
                                                        • Opcode Fuzzy Hash: 7203c404b4134019538a385ef0c67f8396eb36deb092c1b1c0b5e07b5e63e5ab
                                                        • Instruction Fuzzy Hash: E2F01D7180434DAFDB059FA4D805BAE7FB4FF0830AF008009F955A6192D3798651DF94
                                                        APIs
                                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,008211FC), ref: 008210D4
                                                        • CloseHandle.KERNEL32(?,?,008211FC), ref: 008210E9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                        • String ID:
                                                        • API String ID: 81990902-0
                                                        • Opcode ID: 7f377d287a7c8ef99e59127bf605b87461baea169addd93ea9e01d7dbc5cc768
                                                        • Instruction ID: 8e83b5361f1b60d1c76ef1a3f9c9782daf363eb95e84eaf1fa1c36f7ff5ffe18
                                                        • Opcode Fuzzy Hash: 7f377d287a7c8ef99e59127bf605b87461baea169addd93ea9e01d7dbc5cc768
                                                        • Instruction Fuzzy Hash: DCE04F32004B10EEEB252B51FC09E7377A9FB04311B20882EF4A6805B1DB666CD0DB50
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 00859542
                                                        • NtdllDialogWndProc_W.NTDLL(?,00000084,00000000,?,?,008176FB,?,?,?,?), ref: 0085956C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: DialogLongNtdllProc_Window
                                                        • String ID:
                                                        • API String ID: 2065330234-0
                                                        • Opcode ID: bb4752645fa1eb246d4c41a6514739c479b80e9034329b302238b579a1a46796
                                                        • Instruction ID: b1702fe377034296783969d9c527a304a699bc4fe203b7091989b7464cf1dbe1
                                                        • Opcode Fuzzy Hash: bb4752645fa1eb246d4c41a6514739c479b80e9034329b302238b579a1a46796
                                                        • Instruction Fuzzy Hash: 43E04630104318BAEB160F19DC0AFB93B58FB00BA2F108119F997980E1E6B59AE4E660
                                                        Strings
                                                        • Variable is not of type 'Object'., xrefs: 00810C40
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Variable is not of type 'Object'.
                                                        • API String ID: 0-1840281001
                                                        • Opcode ID: 3ce3a4362f156fdbe075f3cd40e937878c6cfbf9ff7013350554a1d17b2b6d80
                                                        • Instruction ID: b8f8c33736bc61efb6316647eb3851e7af3d790174372cd01af59c327f49bff3
                                                        • Opcode Fuzzy Hash: 3ce3a4362f156fdbe075f3cd40e937878c6cfbf9ff7013350554a1d17b2b6d80
                                                        • Instruction Fuzzy Hash: 3F323671900218EBCF15DF94C885FEDB7B9FF05304F24405DE80AAB292D779AA86DB61
                                                        APIs
                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,007F6766,?,?,00000008,?,?,007FFEFE,00000000), ref: 007F6998
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ExceptionRaise
                                                        • String ID:
                                                        • API String ID: 3997070919-0
                                                        • Opcode ID: 96976965fcd31b6f519bf0a073c56310222f5672dcc040bdae502360a404bc10
                                                        • Instruction ID: 6569668c9d9d397e55e9b3cc102d63331883ab5f6ea39449290bbb9682802bfd
                                                        • Opcode Fuzzy Hash: 96976965fcd31b6f519bf0a073c56310222f5672dcc040bdae502360a404bc10
                                                        • Instruction Fuzzy Hash: E1B128716106099FD719CF28C48AB657BA0FF45364F25C65CEA9ACF3A2C339E991CB40
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID: 0-3916222277
                                                        • Opcode ID: ee7103c07059894ae5d0c61919d29b6fe19a2247ad80c6c9f67cd2291da6c6a2
                                                        • Instruction ID: 3466f9e085206b3a6971243648f2a1d2a272acfa3cf7fd3807c81a80fc74ca8c
                                                        • Opcode Fuzzy Hash: ee7103c07059894ae5d0c61919d29b6fe19a2247ad80c6c9f67cd2291da6c6a2
                                                        • Instruction Fuzzy Hash: C7124C71900229DFCB24CF58C881AEEB7B5FF48710F15819AE849EB355EB349E81DB90
                                                        APIs
                                                          • Part of subcall function 007D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007D9BB2
                                                        • NtdllDialogWndProc_W.NTDLL(?,00000112,?,?), ref: 0085A38F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: DialogLongNtdllProc_Window
                                                        • String ID:
                                                        • API String ID: 2065330234-0
                                                        • Opcode ID: cf1acc894d867cd8f6b77900890d5255c15fde967d2b4262e0e1d42af2cf91dd
                                                        • Instruction ID: 5fe0fb4d0485a8d7897c9f2325312de6e8dd8981699d958c8706c52b227d2eb2
                                                        • Opcode Fuzzy Hash: cf1acc894d867cd8f6b77900890d5255c15fde967d2b4262e0e1d42af2cf91dd
                                                        • Instruction Fuzzy Hash: F31136302042156AFB2D1B2CCC49BBC3A55FB41B6AF144325FD11DA2D2CB645D48D257
                                                        APIs
                                                          • Part of subcall function 007D9944: GetWindowLongW.USER32(?,000000EB), ref: 007D9952
                                                        • CallWindowProcW.USER32(?,?,00000020,?,?), ref: 008587F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$CallLongProc
                                                        • String ID:
                                                        • API String ID: 4084987330-0
                                                        • Opcode ID: 94463d1fd127222d586514f7b9fe5e5e3f274d8f990ba5650519128d34c855cd
                                                        • Instruction ID: f3aa9b928954faeb121875b4c15d9fda75b6d4f39faf778fb6e439f8bb417306
                                                        • Opcode Fuzzy Hash: 94463d1fd127222d586514f7b9fe5e5e3f274d8f990ba5650519128d34c855cd
                                                        • Instruction Fuzzy Hash: 3AF04F3110410CEFCF05AF94DC54CB93BA5FB08362B048416FD119A561DB32AC60EF50
                                                        APIs
                                                          • Part of subcall function 007D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007D9BB2
                                                          • Part of subcall function 007D912D: GetCursorPos.USER32(?), ref: 007D9141
                                                          • Part of subcall function 007D912D: ScreenToClient.USER32(00000000,?), ref: 007D915E
                                                          • Part of subcall function 007D912D: GetAsyncKeyState.USER32(00000001), ref: 007D9183
                                                          • Part of subcall function 007D912D: GetAsyncKeyState.USER32(00000002), ref: 007D919D
                                                        • NtdllDialogWndProc_W.NTDLL(?,00000204,?,?,00000001,?,?,?,00817818,?,?,?,?,?,00000001,?), ref: 00858AF8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: AsyncState$ClientCursorDialogLongNtdllProc_ScreenWindow
                                                        • String ID:
                                                        • API String ID: 2356834413-0
                                                        • Opcode ID: 88295949a6ddbd0edf3c5168c26b20f4051d4530188897eb2b679e18d7a57519
                                                        • Instruction ID: 16d9de09434b8f97f00872153f436808f81680b53dc8ae0d915160b62e9fbcbf
                                                        • Opcode Fuzzy Hash: 88295949a6ddbd0edf3c5168c26b20f4051d4530188897eb2b679e18d7a57519
                                                        • Instruction Fuzzy Hash: 9CF08270200229EBDF156F15D80EAAA3F61FB00791F000016FD166A291DBB699A4DBE5
                                                        APIs
                                                          • Part of subcall function 007D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007D9BB2
                                                        • NtdllDialogWndProc_W.NTDLL(?,00000006,?,?,?), ref: 007D9096
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: DialogLongNtdllProc_Window
                                                        • String ID:
                                                        • API String ID: 2065330234-0
                                                        • Opcode ID: 563b609700a358741df875158af42360a8dece7fd423fad24c4a4d77ef7b61f0
                                                        • Instruction ID: 803d687be2e4a6ebed10406900dcf5d3c28342ff6e13d93ae664f57cf9ab3281
                                                        • Opcode Fuzzy Hash: 563b609700a358741df875158af42360a8dece7fd423fad24c4a4d77ef7b61f0
                                                        • Instruction Fuzzy Hash: AAF0E23020430ADFDF089F11E858A363B72FB813A0F24812EF9120A3E0C7379891EB60
                                                        APIs
                                                        • BlockInput.USER32(00000001), ref: 0083EABD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: BlockInput
                                                        • String ID:
                                                        • API String ID: 3456056419-0
                                                        • Opcode ID: 006d93583f0d16749fea8e028c0dc12bfde24fae1e326c4ca5a4419806a48571
                                                        • Instruction ID: d987e6ad258b909dae03e3b3ee334f162fad595c613ccb9e32d7c56a3581d5a1
                                                        • Opcode Fuzzy Hash: 006d93583f0d16749fea8e028c0dc12bfde24fae1e326c4ca5a4419806a48571
                                                        • Instruction Fuzzy Hash: 32E01A322002159FC710EF59D809E9AB7E9FFA8760F00841EFC49C7391DA74A8418B90
                                                        APIs
                                                        • NtdllDialogWndProc_W.NTDLL(?,00000232,?,?), ref: 008593C0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: DialogNtdllProc_
                                                        • String ID:
                                                        • API String ID: 3239928679-0
                                                        • Opcode ID: c09c6fe72cdcffbd76939833ec09c39ba336a3c681ac92d62145e756b27dce98
                                                        • Instruction ID: 1c04e3232370d155c5849db7474d17fd351153709eaf20b7e91501e4b531cb0b
                                                        • Opcode Fuzzy Hash: c09c6fe72cdcffbd76939833ec09c39ba336a3c681ac92d62145e756b27dce98
                                                        • Instruction Fuzzy Hash: 13F0A931204349AFDB20EF58DC08FC63BA5FB06360F084008BA20672E1CB717924EB60
                                                        APIs
                                                          • Part of subcall function 007D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007D9BB2
                                                        • NtdllDialogWndProc_W.NTDLL(?,00000007,?,00000000,00000000,?,?), ref: 007D90D5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: DialogLongNtdllProc_Window
                                                        • String ID:
                                                        • API String ID: 2065330234-0
                                                        • Opcode ID: c0d69b8cb1454e8181e309a28e493e7b8401949a1ba77888a14d3a731dca3bd0
                                                        • Instruction ID: 102634f2f5c6033d34309de1226a481f9f2f252a0b2dd9fe3497fc0aeabaf3b3
                                                        • Opcode Fuzzy Hash: c0d69b8cb1454e8181e309a28e493e7b8401949a1ba77888a14d3a731dca3bd0
                                                        • Instruction Fuzzy Hash: D7E08C30204208FBCF05AF90DC19E643B36FB88390F148019FB051A3A1CA37A961DB10
                                                        APIs
                                                        • NtdllDialogWndProc_W.NTDLL(?,00000053,?,?,?,00817723,?,?,?,?,?,?), ref: 008593F6
                                                          • Part of subcall function 00858172: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00893018,0089305C), ref: 008581BF
                                                          • Part of subcall function 00858172: CloseHandle.KERNEL32 ref: 008581D1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateDialogHandleNtdllProc_Process
                                                        • String ID:
                                                        • API String ID: 4178364262-0
                                                        • Opcode ID: 44ef734b47768aa719911bca0a8a42245ca25f64170797aee0b102ccab8a9007
                                                        • Instruction ID: 97f1795f5f405329694d0e05d03e231a087ed38736f524eaed6871fa4335ae72
                                                        • Opcode Fuzzy Hash: 44ef734b47768aa719911bca0a8a42245ca25f64170797aee0b102ccab8a9007
                                                        • Instruction Fuzzy Hash: D7E04631204209DFCB01AF48DC54E863BB6FB08352F004005FE119B2B2CB32A9A8EF10
                                                        APIs
                                                          • Part of subcall function 007D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007D9BB2
                                                          • Part of subcall function 007D8BCD: DestroyWindow.USER32(?), ref: 007D8C81
                                                          • Part of subcall function 007D8BCD: KillTimer.USER32(00000000,?,?,?,?,007D8BBA,00000000,?), ref: 007D8D1B
                                                        • NtdllDialogWndProc_W.NTDLL(?,00000002,00000000,00000000,00000000,?), ref: 007D8BC3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$DestroyDialogKillLongNtdllProc_Timer
                                                        • String ID:
                                                        • API String ID: 2797419724-0
                                                        • Opcode ID: a6039e210c0484cdc94585da35ae67d8e0e481e86df87dea212981ba64ee9022
                                                        • Instruction ID: d7b9381aead4f818738bfd51c872406ccf02d86c074e6e8bdf9838a2a3221487
                                                        • Opcode Fuzzy Hash: a6039e210c0484cdc94585da35ae67d8e0e481e86df87dea212981ba64ee9022
                                                        • Instruction Fuzzy Hash: 38D012B028030CBBEE513BA1DC0FF493A29EB40791F008022F704792D1CAB664505559
                                                        APIs
                                                        • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,007E03EE), ref: 007E09DA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled
                                                        • String ID:
                                                        • API String ID: 3192549508-0
                                                        • Opcode ID: 58b9af771e2ca188bea57c2b146403731b525caf99fee8bfdf429199e74383ef
                                                        • Instruction ID: 4b289d58ed6846241651945082a97c771a076513493dd050ca59505ecc453a3e
                                                        • Opcode Fuzzy Hash: 58b9af771e2ca188bea57c2b146403731b525caf99fee8bfdf429199e74383ef
                                                        • Instruction Fuzzy Hash:
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                        • Instruction ID: d20d3b89a437ce60f300e36af216d74fff09c1750bbd99148567e1c9af7f25d7
                                                        • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                        • Instruction Fuzzy Hash: E751777160F7C59BDB3C856B889E7BE23899F2E340F180519D886CB283CA1DEE41D352
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 610e053a570f798a8a2ffa9050d003e615fa56b4fba81d478a5092db2b9fae90
                                                        • Instruction ID: 8d1415c0e17fe7c24809d06659b54e72ee9fd42b64e0377910cb7435289fed6d
                                                        • Opcode Fuzzy Hash: 610e053a570f798a8a2ffa9050d003e615fa56b4fba81d478a5092db2b9fae90
                                                        • Instruction Fuzzy Hash: E2326622D29F454DD7279634CC22335A249BFB73C5F16D737F81AB5AAAEB69C4838100
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5c3e9f35c5e6b671ddba8c16e4d4504c8120f1e6c5e87e7c9a17949c20caee8d
                                                        • Instruction ID: 558f59ca05792296efc4bde2406d830102d2dd11313ea56df4543f0a42932f63
                                                        • Opcode Fuzzy Hash: 5c3e9f35c5e6b671ddba8c16e4d4504c8120f1e6c5e87e7c9a17949c20caee8d
                                                        • Instruction Fuzzy Hash: 8C321271A8411A8BCF29CE28C4906FD7BB9FF45314F28856BD98ACB291D234DDC1DB51
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 05650ab591bbcfbd754feafdb68f5d935ebfe1889015c4e34b7e55cd8d1a510a
                                                        • Instruction ID: 1cb511f9e291a912e35b85d0020bd061200ceb4f2ab9015e5bf701a1d8e7af71
                                                        • Opcode Fuzzy Hash: 05650ab591bbcfbd754feafdb68f5d935ebfe1889015c4e34b7e55cd8d1a510a
                                                        • Instruction Fuzzy Hash: D6227CB0A04609DBDF14CFA8D885AAEB7B5FF44300F14452DE816E7291EB3AAD54CF64
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5deb991c17cdf0a2e1391063d1b2c99e23ea718f595a9ac652af46e558aa6a1b
                                                        • Instruction ID: 923189a5879ce87944714379cdb0fb087de765304a21c893fcaf168451a9f816
                                                        • Opcode Fuzzy Hash: 5deb991c17cdf0a2e1391063d1b2c99e23ea718f595a9ac652af46e558aa6a1b
                                                        • Instruction Fuzzy Hash: CD02C3B1A00209EBDB44DF64DC85BAEB7B1FF44304F108569E946DB3D1EB35AA60CB91
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                        • Instruction ID: 11a7d0590290f14b716a3450ea77b2777c41190593857819553e80f56ea0afd8
                                                        • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                        • Instruction Fuzzy Hash: C491997260A0E34ADB29863F853603DFFE15A563A235A079DE4F2CB1C5FE38D954D620
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                        • Instruction ID: bfbd99ed2bf3ca4a59d6312b8bbe197e2a4933f05481fa678a265031adf7912c
                                                        • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                        • Instruction Fuzzy Hash: FB91657220A0E34ADB2D427B857603DFFE15A963A135A47AED4F3CA1C1FD38D554D620
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 52ddf15903a37f5009b7e07001d006686b85c40c43cbca49ab7037a8aa9e2a19
                                                        • Instruction ID: cbca08b55e3726d1b66965a8f28016edaecd5df014110778c3408711f9d90cd4
                                                        • Opcode Fuzzy Hash: 52ddf15903a37f5009b7e07001d006686b85c40c43cbca49ab7037a8aa9e2a19
                                                        • Instruction Fuzzy Hash: 42618DB160A7C996DA3C992F8C95BBF3398DF4D700F20492DE842CB291D61D9E42C366
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 61c20ed4cbb62b745bed122d529e757d2ea092871c71529f1f75c13b279ea01e
                                                        • Instruction ID: cd4aa90e27dfe2710018755f352da717dcac4fd342adc2214a301464c976b726
                                                        • Opcode Fuzzy Hash: 61c20ed4cbb62b745bed122d529e757d2ea092871c71529f1f75c13b279ea01e
                                                        • Instruction Fuzzy Hash: 42618C7130A7C9A6DE3CCA2B4C95BBF2389DF4E704F100959E942DF281DA1EAD42C356
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                        • Instruction ID: 46f0a54b4f3c58ac6cb6e4740ce65050a7bbe078d11bf0596ebea0b19d85c8df
                                                        • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                        • Instruction Fuzzy Hash: F881867260A0E34ADB2D423B857643EFFE15A963B135A079DD4F2CB1C2EE38D554D620
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 50c1a38ae5d457dc15b97de159f7575df8f929a98325d2ab8a8a4596eda4d9fb
                                                        • Instruction ID: ec68498554b605cf039629a24612ed0b9eb664e3e3914c88a43fb8e0b05bb0f5
                                                        • Opcode Fuzzy Hash: 50c1a38ae5d457dc15b97de159f7575df8f929a98325d2ab8a8a4596eda4d9fb
                                                        • Instruction Fuzzy Hash: 0B21AB326215118BD72CDE79C82267E73E5F764310F19852EE4A7C77D0DE359904CB80
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00842B30
                                                        • DeleteObject.GDI32(00000000), ref: 00842B43
                                                        • DestroyWindow.USER32 ref: 00842B52
                                                        • GetDesktopWindow.USER32 ref: 00842B6D
                                                        • GetWindowRect.USER32(00000000), ref: 00842B74
                                                        • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00842CA3
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00842CB1
                                                        • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00842CF8
                                                        • GetClientRect.USER32(00000000,?), ref: 00842D04
                                                        • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00842D40
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00842D62
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00842D75
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00842D80
                                                        • GlobalLock.KERNEL32(00000000), ref: 00842D89
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00842D98
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00842DA1
                                                        • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00842DA8
                                                        • GlobalFree.KERNEL32(00000000), ref: 00842DB3
                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00842DC5
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,0085FC38,00000000), ref: 00842DDB
                                                        • GlobalFree.KERNEL32(00000000), ref: 00842DEB
                                                        • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00842E11
                                                        • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00842E30
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00842E52
                                                        • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0084303F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                        • API String ID: 2211948467-2373415609
                                                        • Opcode ID: 8d9c176df576b11fb12cc5be776d6dd48d6324532d14457f18fb19c54485d619
                                                        • Instruction ID: bac7b0a61116de4fa1221f45754291edfb99ed31310837df42f0f63bb99e4c95
                                                        • Opcode Fuzzy Hash: 8d9c176df576b11fb12cc5be776d6dd48d6324532d14457f18fb19c54485d619
                                                        • Instruction Fuzzy Hash: BD023771900209EFDB14DFA4DC89EAE7BB9FB48711F048159F915AB2A1DB78AD01CF60
                                                        APIs
                                                        • SetTextColor.GDI32(?,00000000), ref: 0085712F
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00857160
                                                        • GetSysColor.USER32(0000000F), ref: 0085716C
                                                        • SetBkColor.GDI32(?,000000FF), ref: 00857186
                                                        • SelectObject.GDI32(?,?), ref: 00857195
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 008571C0
                                                        • GetSysColor.USER32(00000010), ref: 008571C8
                                                        • CreateSolidBrush.GDI32(00000000), ref: 008571CF
                                                        • FrameRect.USER32(?,?,00000000), ref: 008571DE
                                                        • DeleteObject.GDI32(00000000), ref: 008571E5
                                                        • InflateRect.USER32(?,000000FE,000000FE), ref: 00857230
                                                        • FillRect.USER32(?,?,?), ref: 00857262
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00857284
                                                          • Part of subcall function 008573E8: GetSysColor.USER32(00000012), ref: 00857421
                                                          • Part of subcall function 008573E8: SetTextColor.GDI32(?,?), ref: 00857425
                                                          • Part of subcall function 008573E8: GetSysColorBrush.USER32(0000000F), ref: 0085743B
                                                          • Part of subcall function 008573E8: GetSysColor.USER32(0000000F), ref: 00857446
                                                          • Part of subcall function 008573E8: GetSysColor.USER32(00000011), ref: 00857463
                                                          • Part of subcall function 008573E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00857471
                                                          • Part of subcall function 008573E8: SelectObject.GDI32(?,00000000), ref: 00857482
                                                          • Part of subcall function 008573E8: SetBkColor.GDI32(?,00000000), ref: 0085748B
                                                          • Part of subcall function 008573E8: SelectObject.GDI32(?,?), ref: 00857498
                                                          • Part of subcall function 008573E8: InflateRect.USER32(?,000000FF,000000FF), ref: 008574B7
                                                          • Part of subcall function 008573E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008574CE
                                                          • Part of subcall function 008573E8: GetWindowLongW.USER32(00000000,000000F0), ref: 008574DB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                        • String ID:
                                                        • API String ID: 4124339563-0
                                                        • Opcode ID: cf4c9166ffe574330998350fc3ffd2ad1491b1cbffa8e1f68296cb7b504372ee
                                                        • Instruction ID: 613af097dd048f79602dde4377ab3607ecc6dfae2ddd3f88496ef5504128bd9c
                                                        • Opcode Fuzzy Hash: cf4c9166ffe574330998350fc3ffd2ad1491b1cbffa8e1f68296cb7b504372ee
                                                        • Instruction Fuzzy Hash: D2A19072008701AFDB019F64DC48A5BBBA9FB49322F104A19F9A2D61E1E779E948CF51
                                                        APIs
                                                        • DestroyWindow.USER32(00000000), ref: 0084273E
                                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0084286A
                                                        • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 008428A9
                                                        • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 008428B9
                                                        • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00842900
                                                        • GetClientRect.USER32(00000000,?), ref: 0084290C
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00842955
                                                        • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00842964
                                                        • GetStockObject.GDI32(00000011), ref: 00842974
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00842978
                                                        • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00842988
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00842991
                                                        • DeleteDC.GDI32(00000000), ref: 0084299A
                                                        • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 008429C6
                                                        • SendMessageW.USER32(00000030,00000000,00000001), ref: 008429DD
                                                        • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00842A1D
                                                        • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00842A31
                                                        • SendMessageW.USER32(00000404,00000001,00000000), ref: 00842A42
                                                        • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00842A77
                                                        • GetStockObject.GDI32(00000011), ref: 00842A82
                                                        • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00842A8D
                                                        • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00842A97
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                        • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                        • API String ID: 2910397461-517079104
                                                        • Opcode ID: e1c65497e154722f1084a2ec176875f735400a7b85aff5c5ff7855cb48c9e9af
                                                        • Instruction ID: 6ac38a78566d360cebea23bc96c49bb84e08a12921675d66f08985a8a889a2a9
                                                        • Opcode Fuzzy Hash: e1c65497e154722f1084a2ec176875f735400a7b85aff5c5ff7855cb48c9e9af
                                                        • Instruction Fuzzy Hash: 47B13A71A40219AFEB14DF68DC8AFAE7BB9FB08715F004159F915E7290DB78AD40CB90
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00834AED
                                                        • GetDriveTypeW.KERNEL32(?,0085CB68,?,\\.\,0085CC08), ref: 00834BCA
                                                        • SetErrorMode.KERNEL32(00000000,0085CB68,?,\\.\,0085CC08), ref: 00834D36
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$DriveType
                                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                        • API String ID: 2907320926-4222207086
                                                        • Opcode ID: 9b4aa055393aebb2f51438aef80e27c0a39ec9367af89df8c9e89dc838f02b14
                                                        • Instruction ID: 855fe11cbfef22b4d75f868a83d3eee09bb7f09193d7fbd345608dd7cf203110
                                                        • Opcode Fuzzy Hash: 9b4aa055393aebb2f51438aef80e27c0a39ec9367af89df8c9e89dc838f02b14
                                                        • Instruction Fuzzy Hash: C4619330605209DBCB14EF64CA85D69B7A1FB84304F24A419F816EB752EB3AFD52DBC1
                                                        APIs
                                                        • DestroyWindow.USER32(?,?), ref: 007D8E14
                                                        • SendMessageW.USER32(?,00001308,?,00000000), ref: 00816AC5
                                                        • 6F550200.COMCTL32(?,000000FF,?), ref: 00816AFE
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00816F43
                                                          • Part of subcall function 007D8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007D8BE8,?,00000000,?,?,?,?,007D8BBA,00000000,?), ref: 007D8FC5
                                                        • SendMessageW.USER32(?,00001053), ref: 00816F7F
                                                        • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00816F96
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$DestroyF550200InvalidateMoveRect
                                                        • String ID: 0
                                                        • API String ID: 268457297-4108050209
                                                        • Opcode ID: c3b5572a834f7ebb10586694c2ab6671e69d7004183675473ba3599cc32d288f
                                                        • Instruction ID: 7714bac147c9fe0fdeeab4b91ff80050bbffb42616accee3f0715a61dce54d6b
                                                        • Opcode Fuzzy Hash: c3b5572a834f7ebb10586694c2ab6671e69d7004183675473ba3599cc32d288f
                                                        • Instruction Fuzzy Hash: 3F129C30204201DFDB65DF24D888BA5BBF9FF44311F58456AE485CB261DB35E8A2DF92
                                                        APIs
                                                        • GetSysColor.USER32(00000012), ref: 00857421
                                                        • SetTextColor.GDI32(?,?), ref: 00857425
                                                        • GetSysColorBrush.USER32(0000000F), ref: 0085743B
                                                        • GetSysColor.USER32(0000000F), ref: 00857446
                                                        • CreateSolidBrush.GDI32(?), ref: 0085744B
                                                        • GetSysColor.USER32(00000011), ref: 00857463
                                                        • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00857471
                                                        • SelectObject.GDI32(?,00000000), ref: 00857482
                                                        • SetBkColor.GDI32(?,00000000), ref: 0085748B
                                                        • SelectObject.GDI32(?,?), ref: 00857498
                                                        • InflateRect.USER32(?,000000FF,000000FF), ref: 008574B7
                                                        • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 008574CE
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 008574DB
                                                        • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0085752A
                                                        • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00857554
                                                        • InflateRect.USER32(?,000000FD,000000FD), ref: 00857572
                                                        • DrawFocusRect.USER32(?,?), ref: 0085757D
                                                        • GetSysColor.USER32(00000011), ref: 0085758E
                                                        • SetTextColor.GDI32(?,00000000), ref: 00857596
                                                        • DrawTextW.USER32(?,008570F5,000000FF,?,00000000), ref: 008575A8
                                                        • SelectObject.GDI32(?,?), ref: 008575BF
                                                        • DeleteObject.GDI32(?), ref: 008575CA
                                                        • SelectObject.GDI32(?,?), ref: 008575D0
                                                        • DeleteObject.GDI32(?), ref: 008575D5
                                                        • SetTextColor.GDI32(?,?), ref: 008575DB
                                                        • SetBkColor.GDI32(?,?), ref: 008575E5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                        • String ID:
                                                        • API String ID: 1996641542-0
                                                        • Opcode ID: f3376bb53dfa6ac1cc055a71dfeaad18f84d3e2ac7882c40d247c728f6d41d66
                                                        • Instruction ID: 95e4528ffd98773882fec507af1f19da99e66a7dae2ea0ee99f28d6cc61fcd2f
                                                        • Opcode Fuzzy Hash: f3376bb53dfa6ac1cc055a71dfeaad18f84d3e2ac7882c40d247c728f6d41d66
                                                        • Instruction Fuzzy Hash: 2B615C72900718AFDF019FA4DC49EAEBFB9FB08362F118115F915AB2A1E7749940CF90
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 00851128
                                                        • GetDesktopWindow.USER32 ref: 0085113D
                                                        • GetWindowRect.USER32(00000000), ref: 00851144
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00851199
                                                        • DestroyWindow.USER32(?), ref: 008511B9
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 008511ED
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0085120B
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0085121D
                                                        • SendMessageW.USER32(00000000,00000421,?,?), ref: 00851232
                                                        • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00851245
                                                        • IsWindowVisible.USER32(00000000), ref: 008512A1
                                                        • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 008512BC
                                                        • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 008512D0
                                                        • GetWindowRect.USER32(00000000,?), ref: 008512E8
                                                        • MonitorFromPoint.USER32(?,?,00000002), ref: 0085130E
                                                        • GetMonitorInfoW.USER32(00000000,?), ref: 00851328
                                                        • CopyRect.USER32(?,?), ref: 0085133F
                                                        • SendMessageW.USER32(00000000,00000412,00000000), ref: 008513AA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                        • String ID: ($0$tooltips_class32
                                                        • API String ID: 698492251-4156429822
                                                        • Opcode ID: 5f13531b0ccb95406abfe7bc435e20a59ec4c9549135424d48e98121665823b7
                                                        • Instruction ID: 9d0e937be3b844490c2fe1ee3641613475bdcd92d2dae75dcc5c0b340e1c6413
                                                        • Opcode Fuzzy Hash: 5f13531b0ccb95406abfe7bc435e20a59ec4c9549135424d48e98121665823b7
                                                        • Instruction Fuzzy Hash: F9B16971604341AFDB04DF64C889B6ABBE4FF88355F00891CF999DB2A1D775E848CB91
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007D8968
                                                        • GetSystemMetrics.USER32(00000007), ref: 007D8970
                                                        • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 007D899B
                                                        • GetSystemMetrics.USER32(00000008), ref: 007D89A3
                                                        • GetSystemMetrics.USER32(00000004), ref: 007D89C8
                                                        • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 007D89E5
                                                        • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 007D89F5
                                                        • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 007D8A28
                                                        • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 007D8A3C
                                                        • GetClientRect.USER32(00000000,000000FF), ref: 007D8A5A
                                                        • GetStockObject.GDI32(00000011), ref: 007D8A76
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 007D8A81
                                                          • Part of subcall function 007D912D: GetCursorPos.USER32(?), ref: 007D9141
                                                          • Part of subcall function 007D912D: ScreenToClient.USER32(00000000,?), ref: 007D915E
                                                          • Part of subcall function 007D912D: GetAsyncKeyState.USER32(00000001), ref: 007D9183
                                                          • Part of subcall function 007D912D: GetAsyncKeyState.USER32(00000002), ref: 007D919D
                                                        • SetTimer.USER32(00000000,00000000,00000028,007D90FC), ref: 007D8AA8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                        • String ID: AutoIt v3 GUI
                                                        • API String ID: 1458621304-248962490
                                                        • Opcode ID: f03ff511d4f47688ceeae06b7aeba3d0955e734045cfe270fe1dce0b3a8a138c
                                                        • Instruction ID: efa9598c6257c2bc600d8fcf70ab0f4ef601b5a934fce723bd6618383dd9bf6d
                                                        • Opcode Fuzzy Hash: f03ff511d4f47688ceeae06b7aeba3d0955e734045cfe270fe1dce0b3a8a138c
                                                        • Instruction Fuzzy Hash: 52B17E75A0020A9FDF14DFA8CC49BAE7BB5FB48315F14422AFA55E7290DB38A840CF51
                                                        APIs
                                                          • Part of subcall function 008210F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00821114
                                                          • Part of subcall function 008210F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00820B9B,?,?,?), ref: 00821120
                                                          • Part of subcall function 008210F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00820B9B,?,?,?), ref: 0082112F
                                                          • Part of subcall function 008210F9: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 00821136
                                                          • Part of subcall function 008210F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0082114D
                                                        • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00820DF5
                                                        • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00820E29
                                                        • GetLengthSid.ADVAPI32(?), ref: 00820E40
                                                        • GetAce.ADVAPI32(?,00000000,?), ref: 00820E7A
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00820E96
                                                        • GetLengthSid.ADVAPI32(?), ref: 00820EAD
                                                        • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00820EB5
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 00820EBC
                                                        • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00820EDD
                                                        • CopySid.ADVAPI32(00000000), ref: 00820EE4
                                                        • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00820F13
                                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00820F35
                                                        • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00820F47
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00820F6E
                                                        • HeapFree.KERNEL32(00000000), ref: 00820F75
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00820F7E
                                                        • HeapFree.KERNEL32(00000000), ref: 00820F85
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00820F8E
                                                        • HeapFree.KERNEL32(00000000), ref: 00820F95
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 00820FA1
                                                        • HeapFree.KERNEL32(00000000), ref: 00820FA8
                                                          • Part of subcall function 00821193: GetProcessHeap.KERNEL32(00000008,00820BB1,?,00000000,?,00820BB1,?), ref: 008211A1
                                                          • Part of subcall function 00821193: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 008211A8
                                                          • Part of subcall function 00821193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00820BB1,?), ref: 008211B7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$Security$Free$AllocateDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                        • String ID:
                                                        • API String ID: 4042927181-0
                                                        • Opcode ID: b82d427d22c0f5630cd0f011efd4089353a714539e81240059e0a1e1a129a1dc
                                                        • Instruction ID: e8fd5a8f357dda4ca454edf5055c1e289083482d309abcadce38e1268c6ff566
                                                        • Opcode Fuzzy Hash: b82d427d22c0f5630cd0f011efd4089353a714539e81240059e0a1e1a129a1dc
                                                        • Instruction Fuzzy Hash: 4E71587290031AAFDF209FA4ED48BAEBBB8FF04311F144115F959E6192DB359A49CF60
                                                        APIs
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0084C4BD
                                                        • RegCreateKeyExW.ADVAPI32(?,?,00000000,0085CC08,00000000,?,00000000,?,?), ref: 0084C544
                                                        • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0084C5A4
                                                        • _wcslen.LIBCMT ref: 0084C5F4
                                                        • _wcslen.LIBCMT ref: 0084C66F
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0084C6B2
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0084C7C1
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0084C84D
                                                        • RegCloseKey.ADVAPI32(?), ref: 0084C881
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0084C88E
                                                        • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0084C960
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                        • API String ID: 9721498-966354055
                                                        • Opcode ID: 8a5d51ae04628172a889ae8505e336ee6430dfda810ef8a0af60926cdebed14d
                                                        • Instruction ID: be2dd260acb22fb38b473eb4da6896b001c3d3eb43183bb3858c07a2195cdbe6
                                                        • Opcode Fuzzy Hash: 8a5d51ae04628172a889ae8505e336ee6430dfda810ef8a0af60926cdebed14d
                                                        • Instruction Fuzzy Hash: 1D123335604204DFDB54DF14C885E2AB7E9FF88714F14889CF88A9B2A2DB35ED41CB85
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?), ref: 008509C6
                                                        • _wcslen.LIBCMT ref: 00850A01
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00850A54
                                                        • _wcslen.LIBCMT ref: 00850A8A
                                                        • _wcslen.LIBCMT ref: 00850B06
                                                        • _wcslen.LIBCMT ref: 00850B81
                                                          • Part of subcall function 007DF9F2: _wcslen.LIBCMT ref: 007DF9FD
                                                          • Part of subcall function 00822BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00822BFA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$MessageSend$BuffCharUpper
                                                        • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                        • API String ID: 1103490817-4258414348
                                                        • Opcode ID: 75cd2214b0511e98eaf3d5cdf070d7bf2619d752b5236af4b25df9aee1b4d284
                                                        • Instruction ID: 069bf50da15b63899b403c40f4cfe979c524736a96c0bd3eeb07e5e1809b08bc
                                                        • Opcode Fuzzy Hash: 75cd2214b0511e98eaf3d5cdf070d7bf2619d752b5236af4b25df9aee1b4d284
                                                        • Instruction Fuzzy Hash: B4E157356083119FC714EF24C49092AB7E2FF98319B14895DF896AB362DB35ED49CF82
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                        • API String ID: 1256254125-909552448
                                                        • Opcode ID: 4347bb6bef5f5e41b4d12df90ceff79e39b4ab18f86f4a19969df268d0e80721
                                                        • Instruction ID: 2466a167981afbf23a6eeb048a47ef226ff5866224fda638ed2ab8feb5e560e5
                                                        • Opcode Fuzzy Hash: 4347bb6bef5f5e41b4d12df90ceff79e39b4ab18f86f4a19969df268d0e80721
                                                        • Instruction Fuzzy Hash: 5D71167260212E8BCB60EE7CCD515BE33A9FF60764B250528FC66E7284EA35DD44C7A0
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 0085835A
                                                        • _wcslen.LIBCMT ref: 0085836E
                                                        • _wcslen.LIBCMT ref: 00858391
                                                        • _wcslen.LIBCMT ref: 008583B4
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 008583F2
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,0085361A,?), ref: 0085844E
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00858487
                                                        • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 008584CA
                                                        • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00858501
                                                        • FreeLibrary.KERNEL32(?), ref: 0085850D
                                                        • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0085851D
                                                        • DestroyCursor.USER32(?), ref: 0085852C
                                                        • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00858549
                                                        • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00858555
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Load$Image_wcslen$LibraryMessageSend$CursorDestroyExtractFreeIcon
                                                        • String ID: .dll$.exe$.icl
                                                        • API String ID: 391920613-1154884017
                                                        • Opcode ID: 6b80c635bc7514e1f2f0d1a31bef26dcc7ff0d059b035c44638812f6fd149d52
                                                        • Instruction ID: 1dc692e3f9c63079141f89cab4e051a1bed2853b7ff8af6e103b3bc514486003
                                                        • Opcode Fuzzy Hash: 6b80c635bc7514e1f2f0d1a31bef26dcc7ff0d059b035c44638812f6fd149d52
                                                        • Instruction Fuzzy Hash: C461AE71500319FEEB149F64CC85BBE77A8FB08B22F10454AFD15E61D1EB78A994CBA0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                        • API String ID: 0-1645009161
                                                        • Opcode ID: 8974bf8846ba5e26f113063da5721356b2f16f4092083c4e88a1ca99fd6d60ad
                                                        • Instruction ID: 329f013c8e33aff447018a4b260cf5543fe9fe30895c5b665ae13ff246ea91d8
                                                        • Opcode Fuzzy Hash: 8974bf8846ba5e26f113063da5721356b2f16f4092083c4e88a1ca99fd6d60ad
                                                        • Instruction Fuzzy Hash: 2781D471644609FBDB64AF60CD46FAF37A8FF14300F04402DF915AA296EB78DA15CBA1
                                                        APIs
                                                        • LoadIconW.USER32(00000063), ref: 00825A2E
                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00825A40
                                                        • SetWindowTextW.USER32(?,?), ref: 00825A57
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00825A6C
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00825A72
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00825A82
                                                        • SetWindowTextW.USER32(00000000,?), ref: 00825A88
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00825AA9
                                                        • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00825AC3
                                                        • GetWindowRect.USER32(?,?), ref: 00825ACC
                                                        • _wcslen.LIBCMT ref: 00825B33
                                                        • SetWindowTextW.USER32(?,?), ref: 00825B6F
                                                        • GetDesktopWindow.USER32 ref: 00825B75
                                                        • GetWindowRect.USER32(00000000), ref: 00825B7C
                                                        • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00825BD3
                                                        • GetClientRect.USER32(?,?), ref: 00825BE0
                                                        • PostMessageW.USER32(?,00000005,00000000,?), ref: 00825C05
                                                        • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00825C2F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                        • String ID:
                                                        • API String ID: 895679908-0
                                                        • Opcode ID: 0a276f5aa06b136a5988a4c09130079ca6db8a0b7968c0e205bba207cf1288d1
                                                        • Instruction ID: da2a4ff784b034964ab7b0e343dfb26438f3a42255afddad2daab6eb8c45038b
                                                        • Opcode Fuzzy Hash: 0a276f5aa06b136a5988a4c09130079ca6db8a0b7968c0e205bba207cf1288d1
                                                        • Instruction Fuzzy Hash: BB718C31900B19AFDB20DFA8DE89AAEBBF5FF48715F104918E542E25A0D774E984CF50
                                                        APIs
                                                        • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 007E00C6
                                                          • Part of subcall function 007E00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0089070C,00000FA0,33F761F6,?,?,?,?,008023B3,000000FF), ref: 007E011C
                                                          • Part of subcall function 007E00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,008023B3,000000FF), ref: 007E0127
                                                          • Part of subcall function 007E00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,008023B3,000000FF), ref: 007E0138
                                                          • Part of subcall function 007E00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 007E014E
                                                          • Part of subcall function 007E00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 007E015C
                                                          • Part of subcall function 007E00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 007E016A
                                                          • Part of subcall function 007E00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007E0195
                                                          • Part of subcall function 007E00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 007E01A0
                                                        • ___scrt_fastfail.LIBCMT ref: 007E00E7
                                                          • Part of subcall function 007E00A3: __onexit.LIBCMT ref: 007E00A9
                                                        Strings
                                                        • InitializeConditionVariable, xrefs: 007E0148
                                                        • api-ms-win-core-synch-l1-2-0.dll, xrefs: 007E0122
                                                        • SleepConditionVariableCS, xrefs: 007E0154
                                                        • WakeAllConditionVariable, xrefs: 007E0162
                                                        • kernel32.dll, xrefs: 007E0133
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                        • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                        • API String ID: 66158676-1714406822
                                                        • Opcode ID: 02bbdb35c3d3ed2d68af69efc2c4ce18da34455fcbe703bd2598f953fffb6af4
                                                        • Instruction ID: 5704595f4cea1ef2d04ecadd4c61e76f99e4a50c2358933773f4e1ee9e9e5739
                                                        • Opcode Fuzzy Hash: 02bbdb35c3d3ed2d68af69efc2c4ce18da34455fcbe703bd2598f953fffb6af4
                                                        • Instruction Fuzzy Hash: 4F21A732646754AFD7116BA5AC09B6E37B4FB09B62F14012AF911E6391DBBC98408ED0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                        • API String ID: 176396367-1603158881
                                                        • Opcode ID: c9cb551b38f6ed039ff2a6b306dcc7f2710a69ed03e04e481a8f7422c4119e23
                                                        • Instruction ID: d37f5b5df863e973662a72d95a5611262eb30f3f5741d805b2730c2a7fd05f8a
                                                        • Opcode Fuzzy Hash: c9cb551b38f6ed039ff2a6b306dcc7f2710a69ed03e04e481a8f7422c4119e23
                                                        • Instruction Fuzzy Hash: 94E1E232A00626EBCB14EFA8D465AEDBBB4FF14714F54811AE556F3240DB38AFC58790
                                                        APIs
                                                        • CharLowerBuffW.USER32(00000000,00000000,0085CC08), ref: 00834527
                                                        • _wcslen.LIBCMT ref: 0083453B
                                                        • _wcslen.LIBCMT ref: 00834599
                                                        • _wcslen.LIBCMT ref: 008345F4
                                                        • _wcslen.LIBCMT ref: 0083463F
                                                        • _wcslen.LIBCMT ref: 008346A7
                                                          • Part of subcall function 007DF9F2: _wcslen.LIBCMT ref: 007DF9FD
                                                        • GetDriveTypeW.KERNEL32(?,00886BF0,00000061), ref: 00834743
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharDriveLowerType
                                                        • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                        • API String ID: 2055661098-1000479233
                                                        • Opcode ID: 9a03655fe780fe2af393963ddb8dcbb0811563a52b9b755aa00470ec546d74c0
                                                        • Instruction ID: cf47882f041c04211554472462418021f935d3f08fa77f7029befdf8c78dc129
                                                        • Opcode Fuzzy Hash: 9a03655fe780fe2af393963ddb8dcbb0811563a52b9b755aa00470ec546d74c0
                                                        • Instruction Fuzzy Hash: 85B110316083029FC710EF28C895A6AB7E5FFE5764F50591DF496C7292E734E844CBA2
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 0084B198
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0084B1B0
                                                        • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0084B1D4
                                                        • _wcslen.LIBCMT ref: 0084B200
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0084B214
                                                        • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0084B236
                                                        • _wcslen.LIBCMT ref: 0084B332
                                                          • Part of subcall function 008305A7: GetStdHandle.KERNEL32(000000F6), ref: 008305C6
                                                        • _wcslen.LIBCMT ref: 0084B34B
                                                        • _wcslen.LIBCMT ref: 0084B366
                                                        • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0084B3B6
                                                        • GetLastError.KERNEL32(00000000), ref: 0084B407
                                                        • CloseHandle.KERNEL32(?), ref: 0084B439
                                                        • CloseHandle.KERNEL32(00000000), ref: 0084B44A
                                                        • CloseHandle.KERNEL32(00000000), ref: 0084B45C
                                                        • CloseHandle.KERNEL32(00000000), ref: 0084B46E
                                                        • CloseHandle.KERNEL32(?), ref: 0084B4E3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 2178637699-0
                                                        • Opcode ID: fadc514cf0cfb48171398b55d46ceafcc3d2b46f0409031b053f9cb4e9b3b1bc
                                                        • Instruction ID: 67d26ea0b7cf247574ad894151ec6a8a7cdb6b4d58bb11d169c773b28d5663d7
                                                        • Opcode Fuzzy Hash: fadc514cf0cfb48171398b55d46ceafcc3d2b46f0409031b053f9cb4e9b3b1bc
                                                        • Instruction Fuzzy Hash: C6F16531608244DFC724EF24C895B2ABBE5FF84314F14855DF8999B2A2CB35EC40CB92
                                                        APIs
                                                        • GetMenuItemCount.USER32(00891990), ref: 00802F8D
                                                        • GetMenuItemCount.USER32(00891990), ref: 0080303D
                                                        • GetCursorPos.USER32(?), ref: 00803081
                                                        • SetForegroundWindow.USER32(00000000), ref: 0080308A
                                                        • TrackPopupMenuEx.USER32(00891990,00000000,?,00000000,00000000,00000000), ref: 0080309D
                                                        • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 008030A9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                        • String ID: 0
                                                        • API String ID: 36266755-4108050209
                                                        • Opcode ID: 308021bd3d145a16e1964af9e8a1ea759cce1fa4d29240c18f0435be9ce00830
                                                        • Instruction ID: 858fe4a1ab6d46897904f843d0255b8a38af4c403606ae0e591ec51fc73b42de
                                                        • Opcode Fuzzy Hash: 308021bd3d145a16e1964af9e8a1ea759cce1fa4d29240c18f0435be9ce00830
                                                        • Instruction Fuzzy Hash: A1713870640316BEEB218F68DC4DF9ABF68FF04364F20421AF915A61E0C7B5AD10CB50
                                                        APIs
                                                        • DestroyWindow.USER32(?,?), ref: 00856DEB
                                                          • Part of subcall function 007C6B57: _wcslen.LIBCMT ref: 007C6B6A
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00856E5F
                                                        • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00856E81
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00856E94
                                                        • DestroyWindow.USER32(?), ref: 00856EB5
                                                        • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,007C0000,00000000), ref: 00856EE4
                                                        • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00856EFD
                                                        • GetDesktopWindow.USER32 ref: 00856F16
                                                        • GetWindowRect.USER32(00000000), ref: 00856F1D
                                                        • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00856F35
                                                        • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00856F4D
                                                          • Part of subcall function 007D9944: GetWindowLongW.USER32(?,000000EB), ref: 007D9952
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                        • String ID: 0$tooltips_class32
                                                        • API String ID: 2429346358-3619404913
                                                        • Opcode ID: 633f95788dab64a658ff63a0fd8a6e3982aeaee4b81c52d4c47e79f9f2330755
                                                        • Instruction ID: 234091d1ffdf65cfcecc9ad01ea8c6df89d5ab738ba6ea19db615baa92533b52
                                                        • Opcode Fuzzy Hash: 633f95788dab64a658ff63a0fd8a6e3982aeaee4b81c52d4c47e79f9f2330755
                                                        • Instruction Fuzzy Hash: 2F717870504345AFDB21DF18D848FAABBE9FB98306F94051EF989C7260DB74A91ACF11
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0083C4B0
                                                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0083C4C3
                                                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0083C4D7
                                                        • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0083C4F0
                                                        • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0083C533
                                                        • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0083C549
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0083C554
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0083C584
                                                        • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0083C5DC
                                                        • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0083C5F0
                                                        • InternetCloseHandle.WININET(00000000), ref: 0083C5FB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                        • String ID:
                                                        • API String ID: 3800310941-3916222277
                                                        • Opcode ID: b2e8e2b4826ad9d462f0fa6bce5c9480974e6fe27e27f174932ef5e4847f9763
                                                        • Instruction ID: a86021cee42dfcff71bd508984dad9678aa1c3bbfd5620b8809d3aa25f86cb83
                                                        • Opcode Fuzzy Hash: b2e8e2b4826ad9d462f0fa6bce5c9480974e6fe27e27f174932ef5e4847f9763
                                                        • Instruction Fuzzy Hash: C15138B1500708BFDB219F64C988AAB7BBCFB88755F00451AF946E6610DB74E944DFA0
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00858592
                                                        • GetFileSize.KERNEL32(00000000,00000000), ref: 008585A2
                                                        • GlobalAlloc.KERNEL32(00000002,00000000), ref: 008585AD
                                                        • CloseHandle.KERNEL32(00000000), ref: 008585BA
                                                        • GlobalLock.KERNEL32(00000000), ref: 008585C8
                                                        • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 008585D7
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 008585E0
                                                        • CloseHandle.KERNEL32(00000000), ref: 008585E7
                                                        • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 008585F8
                                                        • OleLoadPicture.OLEAUT32(?,00000000,00000000,0085FC38,?), ref: 00858611
                                                        • GlobalFree.KERNEL32(00000000), ref: 00858621
                                                        • GetObjectW.GDI32(?,00000018,000000FF), ref: 00858641
                                                        • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00858671
                                                        • DeleteObject.GDI32(00000000), ref: 00858699
                                                        • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 008586AF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                        • String ID:
                                                        • API String ID: 3840717409-0
                                                        • Opcode ID: 28986443417416e9eb61899d6ad1fdd9aefc32d5aa9d0abe95a8d9f9b7d4f5fd
                                                        • Instruction ID: 6372ee05ddc3f96681af8d8353cef5d8a9b0e7c0d4b095abf6c02dfeed293cff
                                                        • Opcode Fuzzy Hash: 28986443417416e9eb61899d6ad1fdd9aefc32d5aa9d0abe95a8d9f9b7d4f5fd
                                                        • Instruction Fuzzy Hash: 36410775600308EFDB119FA5CC48EAABBB8FF99B16F104059F90AE7260DB349945CF60
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000000), ref: 00831502
                                                        • VariantCopy.OLEAUT32(?,?), ref: 0083150B
                                                        • VariantClear.OLEAUT32(?), ref: 00831517
                                                        • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 008315FB
                                                        • VarR8FromDec.OLEAUT32(?,?), ref: 00831657
                                                        • VariantInit.OLEAUT32(?), ref: 00831708
                                                        • SysFreeString.OLEAUT32(?), ref: 0083178C
                                                        • VariantClear.OLEAUT32(?), ref: 008317D8
                                                        • VariantClear.OLEAUT32(?), ref: 008317E7
                                                        • VariantInit.OLEAUT32(00000000), ref: 00831823
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                        • API String ID: 1234038744-3931177956
                                                        • Opcode ID: 791115399cc9c6c0154238cad26795685490f80b96ede0a64e34946a469957d7
                                                        • Instruction ID: 5683be3c03ffecb98681da6544804c34960198e479f667bb01ece32e6949bd75
                                                        • Opcode Fuzzy Hash: 791115399cc9c6c0154238cad26795685490f80b96ede0a64e34946a469957d7
                                                        • Instruction Fuzzy Hash: 2CD1B171A00219EBDF109F65D88DB79B7B5FF84B04F14845AE806EB280DB38EC45DBA1
                                                        APIs
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                          • Part of subcall function 0084C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0084B6AE,?,?), ref: 0084C9B5
                                                          • Part of subcall function 0084C998: _wcslen.LIBCMT ref: 0084C9F1
                                                          • Part of subcall function 0084C998: _wcslen.LIBCMT ref: 0084CA68
                                                          • Part of subcall function 0084C998: _wcslen.LIBCMT ref: 0084CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0084B6F4
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0084B772
                                                        • RegDeleteValueW.ADVAPI32(?,?), ref: 0084B80A
                                                        • RegCloseKey.ADVAPI32(?), ref: 0084B87E
                                                        • RegCloseKey.ADVAPI32(?), ref: 0084B89C
                                                        • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0084B8F2
                                                        • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0084B904
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 0084B922
                                                        • FreeLibrary.KERNEL32(00000000), ref: 0084B983
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0084B994
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 146587525-4033151799
                                                        • Opcode ID: cd9376666ebc4c34612cbdf61bcc5107f01ce3fc469393328ad831e194cf7858
                                                        • Instruction ID: 0d022db7736114b4ca8787039d2c3ef67ee60df971509f30600908e32e9679ca
                                                        • Opcode Fuzzy Hash: cd9376666ebc4c34612cbdf61bcc5107f01ce3fc469393328ad831e194cf7858
                                                        • Instruction Fuzzy Hash: 11C17B31208245EFD714DF24C499F2ABBE5FF84318F18855CE59A8B2A2CB35ED46CB91
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 008425D8
                                                        • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 008425E8
                                                        • CreateCompatibleDC.GDI32(?), ref: 008425F4
                                                        • SelectObject.GDI32(00000000,?), ref: 00842601
                                                        • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0084266D
                                                        • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 008426AC
                                                        • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 008426D0
                                                        • SelectObject.GDI32(?,?), ref: 008426D8
                                                        • DeleteObject.GDI32(?), ref: 008426E1
                                                        • DeleteDC.GDI32(?), ref: 008426E8
                                                        • ReleaseDC.USER32(00000000,?), ref: 008426F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                        • String ID: (
                                                        • API String ID: 2598888154-3887548279
                                                        • Opcode ID: 5c43413ee84e23012ed105bbd59c29d0c68bee394c42e8f78a18f2f0e7793dc1
                                                        • Instruction ID: d819e80876ad1845c5597e58cb96f3e1e0157af874c4bfc45156416322ecbe84
                                                        • Opcode Fuzzy Hash: 5c43413ee84e23012ed105bbd59c29d0c68bee394c42e8f78a18f2f0e7793dc1
                                                        • Instruction Fuzzy Hash: 1461C275D00619EFCF04CFA8D884AAEBBB5FF48310F20852AE955A7250E774A951CF54
                                                        APIs
                                                        • ___free_lconv_mon.LIBCMT ref: 007FDAA1
                                                          • Part of subcall function 007FD63C: _free.LIBCMT ref: 007FD659
                                                          • Part of subcall function 007FD63C: _free.LIBCMT ref: 007FD66B
                                                          • Part of subcall function 007FD63C: _free.LIBCMT ref: 007FD67D
                                                          • Part of subcall function 007FD63C: _free.LIBCMT ref: 007FD68F
                                                          • Part of subcall function 007FD63C: _free.LIBCMT ref: 007FD6A1
                                                          • Part of subcall function 007FD63C: _free.LIBCMT ref: 007FD6B3
                                                          • Part of subcall function 007FD63C: _free.LIBCMT ref: 007FD6C5
                                                          • Part of subcall function 007FD63C: _free.LIBCMT ref: 007FD6D7
                                                          • Part of subcall function 007FD63C: _free.LIBCMT ref: 007FD6E9
                                                          • Part of subcall function 007FD63C: _free.LIBCMT ref: 007FD6FB
                                                          • Part of subcall function 007FD63C: _free.LIBCMT ref: 007FD70D
                                                          • Part of subcall function 007FD63C: _free.LIBCMT ref: 007FD71F
                                                          • Part of subcall function 007FD63C: _free.LIBCMT ref: 007FD731
                                                        • _free.LIBCMT ref: 007FDA96
                                                          • Part of subcall function 007F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007FD7D1,00000000,00000000,00000000,00000000,?,007FD7F8,00000000,00000007,00000000,?,007FDBF5,00000000), ref: 007F29DE
                                                          • Part of subcall function 007F29C8: GetLastError.KERNEL32(00000000,?,007FD7D1,00000000,00000000,00000000,00000000,?,007FD7F8,00000000,00000007,00000000,?,007FDBF5,00000000,00000000), ref: 007F29F0
                                                        • _free.LIBCMT ref: 007FDAB8
                                                        • _free.LIBCMT ref: 007FDACD
                                                        • _free.LIBCMT ref: 007FDAD8
                                                        • _free.LIBCMT ref: 007FDAFA
                                                        • _free.LIBCMT ref: 007FDB0D
                                                        • _free.LIBCMT ref: 007FDB1B
                                                        • _free.LIBCMT ref: 007FDB26
                                                        • _free.LIBCMT ref: 007FDB5E
                                                        • _free.LIBCMT ref: 007FDB65
                                                        • _free.LIBCMT ref: 007FDB82
                                                        • _free.LIBCMT ref: 007FDB9A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                        • String ID:
                                                        • API String ID: 161543041-0
                                                        • Opcode ID: a32cb01b92a63c2380454e4c83bf4aaba876aa326e018c79af99fe61a41ea6d6
                                                        • Instruction ID: 799829d14c0927f6fe4ddb61f0c2f570c4dafb790b3ec564e3d1d76f330ca4fb
                                                        • Opcode Fuzzy Hash: a32cb01b92a63c2380454e4c83bf4aaba876aa326e018c79af99fe61a41ea6d6
                                                        • Instruction Fuzzy Hash: 2A315B71644209DFEB31AA78E849B7A77EAFF00311F114519E648E73A2DA79BC418B24
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 0082369C
                                                        • _wcslen.LIBCMT ref: 008236A7
                                                        • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00823797
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 0082380C
                                                        • GetDlgCtrlID.USER32(?), ref: 0082385D
                                                        • GetWindowRect.USER32(?,?), ref: 00823882
                                                        • GetParent.USER32(?), ref: 008238A0
                                                        • ScreenToClient.USER32(00000000), ref: 008238A7
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00823921
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 0082395D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                        • String ID: %s%u
                                                        • API String ID: 4010501982-679674701
                                                        • Opcode ID: b1a6c7adbc20b5ce500ba3a9bf4087b96b5fcda8e16dd8c781ecdd183613b225
                                                        • Instruction ID: 9979dd12483b1417e44b77402b45ae15511227801ef39de92be695d03c182df0
                                                        • Opcode Fuzzy Hash: b1a6c7adbc20b5ce500ba3a9bf4087b96b5fcda8e16dd8c781ecdd183613b225
                                                        • Instruction Fuzzy Hash: D791D171204726AFD718DF24D8A5FAAF7E9FF45340F008529F999C2190DB38EA85CB91
                                                        APIs
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00824994
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 008249DA
                                                        • _wcslen.LIBCMT ref: 008249EB
                                                        • CharUpperBuffW.USER32(?,00000000), ref: 008249F7
                                                        • _wcsstr.LIBVCRUNTIME ref: 00824A2C
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00824A64
                                                        • GetWindowTextW.USER32(?,?,00000400), ref: 00824A9D
                                                        • GetClassNameW.USER32(00000018,?,00000400), ref: 00824AE6
                                                        • GetClassNameW.USER32(?,?,00000400), ref: 00824B20
                                                        • GetWindowRect.USER32(?,?), ref: 00824B8B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                        • String ID: ThumbnailClass
                                                        • API String ID: 1311036022-1241985126
                                                        • Opcode ID: 961df813d9d2433befd25e85c4aa16c1117f94c8d44b9203d9228527d2b0a042
                                                        • Instruction ID: 15a45442942fa4ad80686347ec42b88f27cfa446d0fbeeebe2c1198aeb70c367
                                                        • Opcode Fuzzy Hash: 961df813d9d2433befd25e85c4aa16c1117f94c8d44b9203d9228527d2b0a042
                                                        • Instruction Fuzzy Hash: A391BD7100432A9FDB04DF54E885BAA77E8FF84314F049469FD86DA096EB34ED85CBA1
                                                        APIs
                                                        • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0084CC64
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0084CC8D
                                                        • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0084CD48
                                                          • Part of subcall function 0084CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0084CCAA
                                                          • Part of subcall function 0084CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0084CCBD
                                                          • Part of subcall function 0084CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0084CCCF
                                                          • Part of subcall function 0084CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0084CD05
                                                          • Part of subcall function 0084CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0084CD28
                                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 0084CCF3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                        • API String ID: 2734957052-4033151799
                                                        • Opcode ID: 97d0a2d76dd8784f48c33537185f1c91d91a49f8940922e683c2c2709f459dbe
                                                        • Instruction ID: 5a3a70278185d0505df676f476b1c4b9e4a69468dbe61879715e0740be9cd488
                                                        • Opcode Fuzzy Hash: 97d0a2d76dd8784f48c33537185f1c91d91a49f8940922e683c2c2709f459dbe
                                                        • Instruction Fuzzy Hash: D8318A7190222DBFDB609BA4DC88EFFBB7CFF05751F000165A906E2250DA389A45DAA0
                                                        APIs
                                                        • timeGetTime.WINMM ref: 0082E6B4
                                                          • Part of subcall function 007DE551: timeGetTime.WINMM(?,?,0082E6D4), ref: 007DE555
                                                        • Sleep.KERNEL32(0000000A), ref: 0082E6E1
                                                        • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0082E705
                                                        • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0082E727
                                                        • SetActiveWindow.USER32 ref: 0082E746
                                                        • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0082E754
                                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 0082E773
                                                        • Sleep.KERNEL32(000000FA), ref: 0082E77E
                                                        • IsWindow.USER32 ref: 0082E78A
                                                        • EndDialog.USER32(00000000), ref: 0082E79B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                        • String ID: BUTTON
                                                        • API String ID: 1194449130-3405671355
                                                        • Opcode ID: 40603e76ed9141183f64af181ad9181df79d571ffcf7264cc563300a834cc780
                                                        • Instruction ID: 7750904e7cf03c79a9a900e97f083272da8c5932e67320f1dc8372e8009db7c3
                                                        • Opcode Fuzzy Hash: 40603e76ed9141183f64af181ad9181df79d571ffcf7264cc563300a834cc780
                                                        • Instruction Fuzzy Hash: 5F219370304315BFEB11AFA4FC89A253BA9F77474AF140426F516C16A2DB79AC40DF29
                                                        APIs
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                        • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0082EA5D
                                                        • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0082EA73
                                                        • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0082EA84
                                                        • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0082EA96
                                                        • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0082EAA7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: SendString$_wcslen
                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                        • API String ID: 2420728520-1007645807
                                                        • Opcode ID: dd0350a3d8ffe0d49814a310921e21c1eae7e1860ec0f7f0e5c8df820c2faf7e
                                                        • Instruction ID: 909c664c36aee1055bccee6e58921691cca18a42e9ca7c5be003a4f512dac22a
                                                        • Opcode Fuzzy Hash: dd0350a3d8ffe0d49814a310921e21c1eae7e1860ec0f7f0e5c8df820c2faf7e
                                                        • Instruction Fuzzy Hash: B1114F21A90269B9D720B7A1EC4AEFF6B7CFBD1B40F40042DB811E21D1EA741955C6B0
                                                        APIs
                                                        • GetDlgItem.USER32(?,00000001), ref: 00825CE2
                                                        • GetWindowRect.USER32(00000000,?), ref: 00825CFB
                                                        • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00825D59
                                                        • GetDlgItem.USER32(?,00000002), ref: 00825D69
                                                        • GetWindowRect.USER32(00000000,?), ref: 00825D7B
                                                        • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00825DCF
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00825DDD
                                                        • GetWindowRect.USER32(00000000,?), ref: 00825DEF
                                                        • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00825E31
                                                        • GetDlgItem.USER32(?,000003EA), ref: 00825E44
                                                        • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00825E5A
                                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00825E67
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                        • String ID:
                                                        • API String ID: 3096461208-0
                                                        • Opcode ID: e60f5b204fa3bc6f7c361c2a2b9c15a1571896c9e5d4a240d00f31af1a96171f
                                                        • Instruction ID: a825481e42e4ee0583d0b35df4a1637e335da7e1a8ed97395723ffe22a448f53
                                                        • Opcode Fuzzy Hash: e60f5b204fa3bc6f7c361c2a2b9c15a1571896c9e5d4a240d00f31af1a96171f
                                                        • Instruction Fuzzy Hash: 5D511C71A40719AFDF18CF68DD89AAEBBB5FB48301F108129F915E6290D774AE40CF50
                                                        APIs
                                                          • Part of subcall function 007D9944: GetWindowLongW.USER32(?,000000EB), ref: 007D9952
                                                        • GetSysColor.USER32(0000000F), ref: 007D9862
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ColorLongWindow
                                                        • String ID:
                                                        • API String ID: 259745315-0
                                                        • Opcode ID: 8354f674605d4d9aaa764e2e003c6cf41fb3118096b32c4a92bb75686c21ba59
                                                        • Instruction ID: 89a8da4ea17af5fba55641aa0171cca1bb136aaf8ef594253daf6327f1eeacc0
                                                        • Opcode Fuzzy Hash: 8354f674605d4d9aaa764e2e003c6cf41fb3118096b32c4a92bb75686c21ba59
                                                        • Instruction Fuzzy Hash: 714173311447449FDB205F389C88BB93B75FB46771F14461AFAA2872E1D7399D41EB10
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: .~
                                                        • API String ID: 0-505086709
                                                        • Opcode ID: 14a0eeb3614ff5dd77136993b0d492b03b5b7075fc5c244b492a28218ca35f44
                                                        • Instruction ID: 0a6a9fad284a35817a476b5e280936ea8de0462b85be011fc2c4508798c73d06
                                                        • Opcode Fuzzy Hash: 14a0eeb3614ff5dd77136993b0d492b03b5b7075fc5c244b492a28218ca35f44
                                                        • Instruction Fuzzy Hash: 84C1D37590424EEFCB11EFA9D845BBDBBB4BF09310F084059E714A7392CB399941CB61
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0080F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00829717
                                                        • LoadStringW.USER32(00000000,?,0080F7F8,00000001), ref: 00829720
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                        • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0080F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00829742
                                                        • LoadStringW.USER32(00000000,?,0080F7F8,00000001), ref: 00829745
                                                        • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00829866
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                        • API String ID: 747408836-2268648507
                                                        • Opcode ID: 4d535ac344d5a2d3181d0283bee4757fbe596094cd5aa7def4eb77e760e7dab9
                                                        • Instruction ID: a63d61bb1e4dcbf13ddcc244630ff7125b06ecf622f86473747527d33cfa57a2
                                                        • Opcode Fuzzy Hash: 4d535ac344d5a2d3181d0283bee4757fbe596094cd5aa7def4eb77e760e7dab9
                                                        • Instruction Fuzzy Hash: 13412072900219AADB14FBE0DD4AEEEB778FF15340F10016DF605B2192EA396F58CB61
                                                        APIs
                                                          • Part of subcall function 007C6B57: _wcslen.LIBCMT ref: 007C6B6A
                                                        • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 008207A2
                                                        • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 008207BE
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 008207DA
                                                        • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00820804
                                                        • CLSIDFromString.COMBASE(?,000001FE), ref: 0082082C
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00820837
                                                        • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0082083C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                        • API String ID: 323675364-22481851
                                                        • Opcode ID: f5c5d4fa5982000d08e1d7193464eb8210bb062589fce3ad2e627024dd425f12
                                                        • Instruction ID: 277844d0c6a75b7824f6206a978221fa0e9c68246054ac012ee4004225347a27
                                                        • Opcode Fuzzy Hash: f5c5d4fa5982000d08e1d7193464eb8210bb062589fce3ad2e627024dd425f12
                                                        • Instruction Fuzzy Hash: 9B41E572C10629EBDF11EBA4EC89DEEB778FF04350B144129E915A31A1EB349E44CF90
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00843C5C
                                                        • CoInitialize.OLE32(00000000), ref: 00843C8A
                                                        • CoUninitialize.COMBASE ref: 00843C94
                                                        • _wcslen.LIBCMT ref: 00843D2D
                                                        • GetRunningObjectTable.OLE32(00000000,?), ref: 00843DB1
                                                        • SetErrorMode.KERNEL32(00000001,00000029), ref: 00843ED5
                                                        • CoGetInstanceFromFile.COMBASE(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00843F0E
                                                        • CoGetObject.OLE32(?,00000000,0085FB98,?), ref: 00843F2D
                                                        • SetErrorMode.KERNEL32(00000000), ref: 00843F40
                                                        • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00843FC4
                                                        • VariantClear.OLEAUT32(?), ref: 00843FD8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                        • String ID:
                                                        • API String ID: 429561992-0
                                                        • Opcode ID: 99a6310c6ed069e59236e0e34670a2d03d068edb811483951cf9ac9e704f6661
                                                        • Instruction ID: 10ed1c152e1e8150ef98d16cf97f3e01085463f68055e0b426330cd43389dd55
                                                        • Opcode Fuzzy Hash: 99a6310c6ed069e59236e0e34670a2d03d068edb811483951cf9ac9e704f6661
                                                        • Instruction Fuzzy Hash: 94C10271608309AFD700DF68C884A2AB7E9FF89748F10491DF98ADB251DB31EE05CB52
                                                        APIs
                                                        • CoInitialize.OLE32(00000000), ref: 00837AF3
                                                        • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00837B8F
                                                        • SHGetDesktopFolder.SHELL32(?), ref: 00837BA3
                                                        • CoCreateInstance.COMBASE(0085FD08,00000000,00000001,00886E6C,?), ref: 00837BEF
                                                        • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00837C74
                                                        • CoTaskMemFree.COMBASE(?), ref: 00837CCC
                                                        • SHBrowseForFolderW.SHELL32(?), ref: 00837D57
                                                        • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00837D7A
                                                        • CoTaskMemFree.COMBASE(00000000), ref: 00837D81
                                                        • CoTaskMemFree.COMBASE(00000000), ref: 00837DD6
                                                        • CoUninitialize.COMBASE ref: 00837DDC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                        • String ID:
                                                        • API String ID: 2762341140-0
                                                        • Opcode ID: e5e6549654f26a7e177b78005e01e2777b99410b6215c3b2b39afbac83cafac8
                                                        • Instruction ID: 45703d74833cb90b1a4e78e3331c85caeaaef3ae057fe053bfb3d7d3b36dc2f1
                                                        • Opcode Fuzzy Hash: e5e6549654f26a7e177b78005e01e2777b99410b6215c3b2b39afbac83cafac8
                                                        • Instruction Fuzzy Hash: CFC1F975A04209AFCB14DF64C888DAEBBF9FF48314F1484A9E915DB261D734ED45CB90
                                                        APIs
                                                        • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00855504
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00855515
                                                        • CharNextW.USER32(00000158), ref: 00855544
                                                        • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00855585
                                                        • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0085559B
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 008555AC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CharNext
                                                        • String ID:
                                                        • API String ID: 1350042424-0
                                                        • Opcode ID: dc5dd2183ca5108dac87e4c8d1df40eb5dd08f0c9f974be99f6f035fb65fe9e9
                                                        • Instruction ID: ce0baee2529dc9f555b080a54a6cda9198babec5c233fa2831781b2c68e1b0f9
                                                        • Opcode Fuzzy Hash: dc5dd2183ca5108dac87e4c8d1df40eb5dd08f0c9f974be99f6f035fb65fe9e9
                                                        • Instruction Fuzzy Hash: 4861BE74904608EFDF109F94DC94AFE7BB9FB09326F104049F925E7290D7388A88DB60
                                                        APIs
                                                        • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0081FAAF
                                                        • SafeArrayAllocData.OLEAUT32(?), ref: 0081FB08
                                                        • VariantInit.OLEAUT32(?), ref: 0081FB1A
                                                        • SafeArrayAccessData.OLEAUT32(?,?), ref: 0081FB3A
                                                        • VariantCopy.OLEAUT32(?,?), ref: 0081FB8D
                                                        • SafeArrayUnaccessData.OLEAUT32(?), ref: 0081FBA1
                                                        • VariantClear.OLEAUT32(?), ref: 0081FBB6
                                                        • SafeArrayDestroyData.OLEAUT32(?), ref: 0081FBC3
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0081FBCC
                                                        • VariantClear.OLEAUT32(?), ref: 0081FBDE
                                                        • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0081FBE9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                        • String ID:
                                                        • API String ID: 2706829360-0
                                                        • Opcode ID: 8eb5d1484e018941a6cfe70b9792ee4da5f3b3311f22d98fbf4aa89dad720b48
                                                        • Instruction ID: cf4e7148e3654ce18ab9b46974321c116c9a5858023687b3b6937a2853979c83
                                                        • Opcode Fuzzy Hash: 8eb5d1484e018941a6cfe70b9792ee4da5f3b3311f22d98fbf4aa89dad720b48
                                                        • Instruction Fuzzy Hash: AE413075A00219DFCB00DF68C858DEDBBB9FF48355F008069E955E7262C734A946CFA0
                                                        APIs
                                                        • GetKeyboardState.USER32(?), ref: 00829CA1
                                                        • GetAsyncKeyState.USER32(000000A0), ref: 00829D22
                                                        • GetKeyState.USER32(000000A0), ref: 00829D3D
                                                        • GetAsyncKeyState.USER32(000000A1), ref: 00829D57
                                                        • GetKeyState.USER32(000000A1), ref: 00829D6C
                                                        • GetAsyncKeyState.USER32(00000011), ref: 00829D84
                                                        • GetKeyState.USER32(00000011), ref: 00829D96
                                                        • GetAsyncKeyState.USER32(00000012), ref: 00829DAE
                                                        • GetKeyState.USER32(00000012), ref: 00829DC0
                                                        • GetAsyncKeyState.USER32(0000005B), ref: 00829DD8
                                                        • GetKeyState.USER32(0000005B), ref: 00829DEA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: State$Async$Keyboard
                                                        • String ID:
                                                        • API String ID: 541375521-0
                                                        • Opcode ID: 4495177f3da183ba72ff16683d249c37b8d727e7d6b8a96bb66909db7a7a9e5c
                                                        • Instruction ID: 58ce416ef76860571ea2aabbdc67a421fa7e25b5264796330d426ef78be52059
                                                        • Opcode Fuzzy Hash: 4495177f3da183ba72ff16683d249c37b8d727e7d6b8a96bb66909db7a7a9e5c
                                                        • Instruction Fuzzy Hash: 4641D6345047D96DFF308664E8043B5BEE0FF11344F04805EDAC6965C2EBE499C8DBA2
                                                        APIs
                                                        • WSAStartup.WS2_32(00000101,?), ref: 008405BC
                                                        • inet_addr.WS2_32(?), ref: 0084061C
                                                        • gethostbyname.WS2_32(?), ref: 00840628
                                                        • IcmpCreateFile.IPHLPAPI ref: 00840636
                                                        • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 008406C6
                                                        • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 008406E5
                                                        • IcmpCloseHandle.IPHLPAPI(?), ref: 008407B9
                                                        • WSACleanup.WS2_32 ref: 008407BF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                        • String ID: Ping
                                                        • API String ID: 1028309954-2246546115
                                                        • Opcode ID: 5d622531aac10b9761c2d7ae366adbf820fce7ccae813b5ce57f25bfb0e2f3fe
                                                        • Instruction ID: 679abf5bfe679ffc303341b132986380dab7af22b02d539f9e44e502d5ff3876
                                                        • Opcode Fuzzy Hash: 5d622531aac10b9761c2d7ae366adbf820fce7ccae813b5ce57f25bfb0e2f3fe
                                                        • Instruction Fuzzy Hash: 8E9157356043059FD320DF15C889F1ABBE0FB88318F1585A9E66ADB6A2C735ED41CF92
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharLower
                                                        • String ID: cdecl$none$stdcall$winapi
                                                        • API String ID: 707087890-567219261
                                                        • Opcode ID: 24caf6f84a5653eecef26fa6a327bda06b15b5798228ec039653c287c5082365
                                                        • Instruction ID: cac2f49caa7152924ea0bd40af5d7af20fe5438fc059fd7dea5e2ac9f15f188e
                                                        • Opcode Fuzzy Hash: 24caf6f84a5653eecef26fa6a327bda06b15b5798228ec039653c287c5082365
                                                        • Instruction Fuzzy Hash: E6519031A0111ADBCF24EFACC9409BEB7A5FF64724B214229E926E72C5EB35DD40C790
                                                        APIs
                                                        • CoInitialize.OLE32 ref: 00843774
                                                        • CoUninitialize.COMBASE ref: 0084377F
                                                        • CoCreateInstance.COMBASE(?,00000000,00000017,0085FB78,?), ref: 008437D9
                                                        • IIDFromString.COMBASE(?,?), ref: 0084384C
                                                        • VariantInit.OLEAUT32(?), ref: 008438E4
                                                        • VariantClear.OLEAUT32(?), ref: 00843936
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                        • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                        • API String ID: 636576611-1287834457
                                                        • Opcode ID: da03b373e456bc1a4a99e7db9342a30ec1f51758cb1c419bb3853a1b997af35e
                                                        • Instruction ID: 3abb555afe6fdc8937a07397e016269bd4f1e5401c81806859e4ea36363c6c67
                                                        • Opcode Fuzzy Hash: da03b373e456bc1a4a99e7db9342a30ec1f51758cb1c419bb3853a1b997af35e
                                                        • Instruction Fuzzy Hash: 7F616AB0608315AFD310DF54C889B6ABBE8FF49715F100829F995DB291D774EE48CB92
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 008333CF
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                        • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 008333F0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: LoadString$_wcslen
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 4099089115-3080491070
                                                        • Opcode ID: 0e33f8f8fd28f89fb8a6d65022a900b4a1be6356be717023d97b74963debca99
                                                        • Instruction ID: abd8cabedb6422c54157ca4a478dbdcfe090c768ebcdebc30cdddb9f1a2ff19e
                                                        • Opcode Fuzzy Hash: 0e33f8f8fd28f89fb8a6d65022a900b4a1be6356be717023d97b74963debca99
                                                        • Instruction Fuzzy Hash: A951BE3190020AEADF14EBA0DD4AEEEB7B8FF14340F104169F505B2192EB392F58DB61
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                        • API String ID: 1256254125-769500911
                                                        • Opcode ID: 4fa73142bc8ebec4bd29532979078a46977a01583b6b17192ae01c267c9b965f
                                                        • Instruction ID: 4af1de377458b904db5fb1ee7578e6c1d393765d68e8528c99939f7488ec2bb3
                                                        • Opcode Fuzzy Hash: 4fa73142bc8ebec4bd29532979078a46977a01583b6b17192ae01c267c9b965f
                                                        • Instruction Fuzzy Hash: B741A532A021369BCB206FBD98905BE77A5FB70758B244229E562D7284F735CDC1C790
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 008353A0
                                                        • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00835416
                                                        • GetLastError.KERNEL32 ref: 00835420
                                                        • SetErrorMode.KERNEL32(00000000,READY), ref: 008354A7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                        • API String ID: 4194297153-14809454
                                                        • Opcode ID: a8906348cf377d79f594873973e295d1b9d2aa8d8b45cbe4061fc98d09322026
                                                        • Instruction ID: 1c6a831d21927122c3cae6bc8082f60cf8a9117d572e8f6e9990cf660a6c1cf8
                                                        • Opcode Fuzzy Hash: a8906348cf377d79f594873973e295d1b9d2aa8d8b45cbe4061fc98d09322026
                                                        • Instruction Fuzzy Hash: 523180B5A006089FC714DF68C488FAABBB4FF85309F148069E905DB292E775DD86CBD1
                                                        APIs
                                                        • CreateMenu.USER32 ref: 00853C79
                                                        • SetMenu.USER32(?,00000000), ref: 00853C88
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00853D10
                                                        • IsMenu.USER32(?), ref: 00853D24
                                                        • CreatePopupMenu.USER32 ref: 00853D2E
                                                        • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00853D5B
                                                        • DrawMenuBar.USER32 ref: 00853D63
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                        • String ID: 0$F
                                                        • API String ID: 161812096-3044882817
                                                        • Opcode ID: 887ae02a88bd71a121b2cff82650506b25d3eefca3231ebff1208438bbfc3c69
                                                        • Instruction ID: 5b634b9ff1332377d7e3c97e6f8531e1a76c1122273166e9f8dd85372b5f997e
                                                        • Opcode Fuzzy Hash: 887ae02a88bd71a121b2cff82650506b25d3eefca3231ebff1208438bbfc3c69
                                                        • Instruction Fuzzy Hash: 82415775A01309EFDB14CFA4D844BAABBB5FF49392F140029ED46A7360D734AA18CF90
                                                        APIs
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00853A9D
                                                        • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00853AA0
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00853AC7
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00853AEA
                                                        • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00853B62
                                                        • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00853BAC
                                                        • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00853BC7
                                                        • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00853BE2
                                                        • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00853BF6
                                                        • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00853C13
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$LongWindow
                                                        • String ID:
                                                        • API String ID: 312131281-0
                                                        • Opcode ID: 4c297bd66765a7f36de2be0cf0fd4ebba02bd612666a070477b7c121ed6b2b25
                                                        • Instruction ID: 39c229bde0c697f8fb87be3bc3fbbd7d2b035bc408bf926c02d46fcaf21aa115
                                                        • Opcode Fuzzy Hash: 4c297bd66765a7f36de2be0cf0fd4ebba02bd612666a070477b7c121ed6b2b25
                                                        • Instruction Fuzzy Hash: 1E617875A00208AFDB11DFA8CC85EEEB7B8FB09750F14409AFA15E72A1C774AE45DB50
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 0082B151
                                                        • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0082A1E1,?,00000001), ref: 0082B165
                                                        • GetWindowThreadProcessId.USER32(00000000), ref: 0082B16C
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0082A1E1,?,00000001), ref: 0082B17B
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 0082B18D
                                                        • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0082A1E1,?,00000001), ref: 0082B1A6
                                                        • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0082A1E1,?,00000001), ref: 0082B1B8
                                                        • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0082A1E1,?,00000001), ref: 0082B1FD
                                                        • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0082A1E1,?,00000001), ref: 0082B212
                                                        • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0082A1E1,?,00000001), ref: 0082B21D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                        • String ID:
                                                        • API String ID: 2156557900-0
                                                        • Opcode ID: 6f5ca538e1c18e2d5d56aa47f4ff50773ebfaefa1df3285ba931a4293339c1a7
                                                        • Instruction ID: 3fbca6b2dc2f573d0c75c1525bed491b914aa24aad457baf715d49fd1b3ff6f5
                                                        • Opcode Fuzzy Hash: 6f5ca538e1c18e2d5d56aa47f4ff50773ebfaefa1df3285ba931a4293339c1a7
                                                        • Instruction Fuzzy Hash: A63189B5511714EFDB10AF64EC48B6E7BA9FB61312F14400AFA02D6191D7B89A80CF64
                                                        APIs
                                                        • _free.LIBCMT ref: 007F2C94
                                                          • Part of subcall function 007F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007FD7D1,00000000,00000000,00000000,00000000,?,007FD7F8,00000000,00000007,00000000,?,007FDBF5,00000000), ref: 007F29DE
                                                          • Part of subcall function 007F29C8: GetLastError.KERNEL32(00000000,?,007FD7D1,00000000,00000000,00000000,00000000,?,007FD7F8,00000000,00000007,00000000,?,007FDBF5,00000000,00000000), ref: 007F29F0
                                                        • _free.LIBCMT ref: 007F2CA0
                                                        • _free.LIBCMT ref: 007F2CAB
                                                        • _free.LIBCMT ref: 007F2CB6
                                                        • _free.LIBCMT ref: 007F2CC1
                                                        • _free.LIBCMT ref: 007F2CCC
                                                        • _free.LIBCMT ref: 007F2CD7
                                                        • _free.LIBCMT ref: 007F2CE2
                                                        • _free.LIBCMT ref: 007F2CED
                                                        • _free.LIBCMT ref: 007F2CFB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 7b75c0e7b2429211e8078bde9c561d54c2d89f3ec88833cdb2bd27df62978d69
                                                        • Instruction ID: 148bf57f52749e1f80555ee72404c39cbf539e99d82ee78528d34da244b03d05
                                                        • Opcode Fuzzy Hash: 7b75c0e7b2429211e8078bde9c561d54c2d89f3ec88833cdb2bd27df62978d69
                                                        • Instruction Fuzzy Hash: 5A11807614010DEFCB02EF94D886CAD3BA5BF05350F5144A5FA48AB332DA75EA519F90
                                                        APIs
                                                        • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 007C1459
                                                        • OleUninitialize.OLE32(?,00000000), ref: 007C14F8
                                                        • UnregisterHotKey.USER32(?), ref: 007C16DD
                                                        • DestroyWindow.USER32(?), ref: 008024B9
                                                        • FreeLibrary.KERNEL32(?), ref: 0080251E
                                                        • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0080254B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                        • String ID: close all
                                                        • API String ID: 469580280-3243417748
                                                        • Opcode ID: 0df2aa1f845e0a7f7baa84f12d9e7636a18d8ccb03511b01270667d0e11a396e
                                                        • Instruction ID: 4f998ad388822f8d1dce0816f23c7ba0ddc1379386d95f8d8037e256af11762e
                                                        • Opcode Fuzzy Hash: 0df2aa1f845e0a7f7baa84f12d9e7636a18d8ccb03511b01270667d0e11a396e
                                                        • Instruction Fuzzy Hash: C7D16931601212CFCB59EF14C899F29F7A4FF05710F5442ADE94AAB292DB35AD22CF94
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit
                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$_NewEnum$get__NewEnum
                                                        • API String ID: 2610073882-1765764032
                                                        • Opcode ID: 77d3d6e7c2625df21b518405a592a825771d0c67bcc7b6d3048a6d932a02c80d
                                                        • Instruction ID: 5498833e78a6addc9177ad3ab499107db2c898db1db8898972eca4d579306ca4
                                                        • Opcode Fuzzy Hash: 77d3d6e7c2625df21b518405a592a825771d0c67bcc7b6d3048a6d932a02c80d
                                                        • Instruction Fuzzy Hash: 80918971A0021DABDF20CFA4C888FAEBBB8FF46714F109559E515EB281D7749946CFA0
                                                        APIs
                                                        • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00837FAD
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00837FC1
                                                        • GetFileAttributesW.KERNEL32(?), ref: 00837FEB
                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 00838005
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00838017
                                                        • SetCurrentDirectoryW.KERNEL32(?), ref: 00838060
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 008380B0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$AttributesFile
                                                        • String ID: *.*
                                                        • API String ID: 769691225-438819550
                                                        • Opcode ID: 560ab8e64a1c5a6133e1a4adcf2cb2fc9a9a05b08bb1965af4cc3a07b458edbb
                                                        • Instruction ID: 18ea1dee8fadd51b538f60904bdd7673d6c1bf29969d97ac1c4da601d3e05785
                                                        • Opcode Fuzzy Hash: 560ab8e64a1c5a6133e1a4adcf2cb2fc9a9a05b08bb1965af4cc3a07b458edbb
                                                        • Instruction Fuzzy Hash: 75817DB2508345DBCB34EF14C894AAAB3E8FBC8714F14486EF885D7250EB79DD458B92
                                                        APIs
                                                        • SetWindowLongW.USER32(?,000000EB), ref: 007C5C7A
                                                          • Part of subcall function 007C5D0A: GetClientRect.USER32(?,?), ref: 007C5D30
                                                          • Part of subcall function 007C5D0A: GetWindowRect.USER32(?,?), ref: 007C5D71
                                                          • Part of subcall function 007C5D0A: ScreenToClient.USER32(?,?), ref: 007C5D99
                                                        • GetDC.USER32 ref: 008046F5
                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00804708
                                                        • SelectObject.GDI32(00000000,00000000), ref: 00804716
                                                        • SelectObject.GDI32(00000000,00000000), ref: 0080472B
                                                        • ReleaseDC.USER32(?,00000000), ref: 00804733
                                                        • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 008047C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                        • String ID: U
                                                        • API String ID: 4009187628-3372436214
                                                        • Opcode ID: 1aba0fadf681fab32d3f553820585bc3ebdcdb7af29a4d3c418483549390d461
                                                        • Instruction ID: ce6abef5fbf266bc86b5a3458114e8310efb7b12000445c9182520b3e11f88a4
                                                        • Opcode Fuzzy Hash: 1aba0fadf681fab32d3f553820585bc3ebdcdb7af29a4d3c418483549390d461
                                                        • Instruction Fuzzy Hash: DF71F170500209DFCF618F64CD84EBA3BB1FF4A315F185269EE519A2A6D7369881DF60
                                                        APIs
                                                        • RtlDecodePointer.NTDLL(?), ref: 007FAFAB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: DecodePointer
                                                        • String ID: acos$asin$exp$log$log10$pow$sqrt
                                                        • API String ID: 3527080286-3064271455
                                                        • Opcode ID: 99677710c857757d47bcd5228b412fe5acb5fc3641d9319225381b5944adf800
                                                        • Instruction ID: 3dce46fd30d0ac30935a21c62cfaadc5556ee5263d1301bc3897aaf61ae8f7ea
                                                        • Opcode Fuzzy Hash: 99677710c857757d47bcd5228b412fe5acb5fc3641d9319225381b5944adf800
                                                        • Instruction Fuzzy Hash: D3517FB490060EDBCF14DFA8E94C1BDBBB4FF49300F210195E691AB364CB798D289B15
                                                        APIs
                                                        • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 008335E4
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                        • LoadStringW.USER32(00892390,?,00000FFF,?), ref: 0083360A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: LoadString$_wcslen
                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                        • API String ID: 4099089115-2391861430
                                                        • Opcode ID: 2a53e7e1a2bf602e86f08f5509df3c408963896b7ce7a947853f7f5882d99d4c
                                                        • Instruction ID: ad8d2e08a3e4e001e93e7c25c4fb0c91338eff452f960f4ecd1827d2dde71829
                                                        • Opcode Fuzzy Hash: 2a53e7e1a2bf602e86f08f5509df3c408963896b7ce7a947853f7f5882d99d4c
                                                        • Instruction Fuzzy Hash: DF516D7190021AFADF14EBA0DC4AEEDBB78FF14340F144129F515B21A1EB381A98DFA1
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00853925
                                                        • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0085393A
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00853954
                                                        • _wcslen.LIBCMT ref: 00853999
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 008539C6
                                                        • SendMessageW.USER32(?,00001061,?,0000000F), ref: 008539F4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window_wcslen
                                                        • String ID: -----$SysListView32
                                                        • API String ID: 2147712094-3975388722
                                                        • Opcode ID: 28f3f1e3df0a48ac58d77027b2f18db20bbc7f4415cac2d71c9dea0d480643d1
                                                        • Instruction ID: cd63969a9a7897e7bf89b5248c65ba31ff5ede642a17bae90bea9d0bfb493fb5
                                                        • Opcode Fuzzy Hash: 28f3f1e3df0a48ac58d77027b2f18db20bbc7f4415cac2d71c9dea0d480643d1
                                                        • Instruction Fuzzy Hash: 21419571A00319ABEF219F64CC49FEA7BA9FF08395F10052AF954E7281D7759E84CB90
                                                        APIs
                                                        • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0083C272
                                                        • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0083C29A
                                                        • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0083C2CA
                                                        • GetLastError.KERNEL32 ref: 0083C322
                                                        • SetEvent.KERNEL32(?), ref: 0083C336
                                                        • InternetCloseHandle.WININET(00000000), ref: 0083C341
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                        • String ID:
                                                        • API String ID: 3113390036-3916222277
                                                        • Opcode ID: 62069151e0132c7c2778360bfa362ffcb3f4d01cfb748e1ef172c66bccae6949
                                                        • Instruction ID: 6412d31e1343938fdaabcf3b6f47eeed56a73ad4d9907122ef4fa7cea6b2ea44
                                                        • Opcode Fuzzy Hash: 62069151e0132c7c2778360bfa362ffcb3f4d01cfb748e1ef172c66bccae6949
                                                        • Instruction Fuzzy Hash: 52314DB1600708AFDB219F65DC88AAB7BFCFB89745F14851DF446E6200DB34DD059BA1
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00803AAF,?,?,Bad directive syntax error,0085CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 008298BC
                                                        • LoadStringW.USER32(00000000,?,00803AAF,?), ref: 008298C3
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                        • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00829987
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadMessageModuleString_wcslen
                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                        • API String ID: 858772685-4153970271
                                                        • Opcode ID: a0b3b721d6c5070d90cb2f93864b5c6cba194442117540ae686c020135d93942
                                                        • Instruction ID: ec59cfcd30ed32bce4f2491fa1bd39d6a9e0e23edde665cbc686ab7efa9a5cf8
                                                        • Opcode Fuzzy Hash: a0b3b721d6c5070d90cb2f93864b5c6cba194442117540ae686c020135d93942
                                                        • Instruction Fuzzy Hash: AF21803190031AEBCF11AF90DC0AEEE7779FF18304F04445EF529A61A2EB399668CB11
                                                        APIs
                                                        • GetParent.USER32 ref: 008220AB
                                                        • GetClassNameW.USER32(00000000,?,00000100), ref: 008220C0
                                                        • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0082214D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameParentSend
                                                        • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                        • API String ID: 1290815626-3381328864
                                                        • Opcode ID: a9f5a792dc54f11396f29cd57d1abb4f5c0dd6c7534b22e965e57d3e19e56493
                                                        • Instruction ID: 457452c497638deedea74084079feb82a7b57569c9a3c097be2f8d19aad2ccb1
                                                        • Opcode Fuzzy Hash: a9f5a792dc54f11396f29cd57d1abb4f5c0dd6c7534b22e965e57d3e19e56493
                                                        • Instruction Fuzzy Hash: 8211277A684716F9F6012221AC0ACE637DCFF18334B200026F704E40D1FF6978A15618
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                        • String ID:
                                                        • API String ID: 1282221369-0
                                                        • Opcode ID: 7f499602bd6a6e0557cae1bba3f6a1d69fdaddf647049b7ab8035206d1c0cc6a
                                                        • Instruction ID: c5f044e4c979612d5c0d8d6c691afa57c06959d708f898b73044ebe8bcbe0b89
                                                        • Opcode Fuzzy Hash: 7f499602bd6a6e0557cae1bba3f6a1d69fdaddf647049b7ab8035206d1c0cc6a
                                                        • Instruction Fuzzy Hash: 8361287290430DAFDB22AFB49949679BBE5EF05320F04426EFB41A7382D63D9D019B50
                                                        APIs
                                                          • Part of subcall function 007D8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,007D8BE8,?,00000000,?,?,?,?,007D8BBA,00000000,?), ref: 007D8FC5
                                                        • DestroyWindow.USER32(?), ref: 007D8C81
                                                        • KillTimer.USER32(00000000,?,?,?,?,007D8BBA,00000000,?), ref: 007D8D1B
                                                        • DestroyAcceleratorTable.USER32(00000000), ref: 00816973
                                                        • DeleteObject.GDI32(00000000), ref: 008169E6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Destroy$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                        • String ID:
                                                        • API String ID: 2402799130-0
                                                        • Opcode ID: 924c510b89e18d7630f5885df56e2fe598f5fa2cd97d91a417e3eca4dfac5c4a
                                                        • Instruction ID: 66c070590683f01a8e02922216fd15755c2179afa99ddbf1d4ee31971ad0d14b
                                                        • Opcode Fuzzy Hash: 924c510b89e18d7630f5885df56e2fe598f5fa2cd97d91a417e3eca4dfac5c4a
                                                        • Instruction Fuzzy Hash: B961BE30116711DFCF61AF18D948B69BBF5FF40312F18455EE0869AAA0CB39A8D0CF62
                                                        APIs
                                                        • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00855186
                                                        • ShowWindow.USER32(?,00000000), ref: 008551C7
                                                        • ShowWindow.USER32(?,00000005,?,00000000), ref: 008551CD
                                                        • SetFocus.USER32(?,?,00000005,?,00000000), ref: 008551D1
                                                          • Part of subcall function 00856FBA: DeleteObject.GDI32(00000000), ref: 00856FE6
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 0085520D
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0085521A
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0085524D
                                                        • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00855287
                                                        • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00855296
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                        • String ID:
                                                        • API String ID: 3210457359-0
                                                        • Opcode ID: 33117f2f06b6a3353abfc608c49c1a3258bf50d33af087dc2f586768ece78ee8
                                                        • Instruction ID: 18ca3a688ade054c403ff73cb2f014919265f0ba615df94e765a9b297b104c4b
                                                        • Opcode Fuzzy Hash: 33117f2f06b6a3353abfc608c49c1a3258bf50d33af087dc2f586768ece78ee8
                                                        • Instruction Fuzzy Hash: 4C518F30A90A09BEEF209F24CC69B983BA5FB05367F144016FE15D66E0C775A988DF41
                                                        APIs
                                                        • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00816890
                                                        • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 008168A9
                                                        • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 008168B9
                                                        • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 008168D1
                                                        • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 008168F2
                                                        • DestroyCursor.USER32(00000000), ref: 00816901
                                                        • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0081691E
                                                        • DestroyCursor.USER32(00000000), ref: 0081692D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CursorDestroyExtractIconImageLoadMessageSend
                                                        • String ID:
                                                        • API String ID: 3992029641-0
                                                        • Opcode ID: 6f58edd349530dc4748dd7c2b5755c61b182fa7bd101d4cd3cd32b1d25c521ea
                                                        • Instruction ID: 35a7f22effe271234a2e4a27f2b0d7205f7cd8c0b0e06e82e41cf8501165d792
                                                        • Opcode Fuzzy Hash: 6f58edd349530dc4748dd7c2b5755c61b182fa7bd101d4cd3cd32b1d25c521ea
                                                        • Instruction Fuzzy Hash: 69518AB0600305EFDB20DF28CC95FAA7BB5FF48351F14452AF956D62A0EB74A990DB50
                                                        APIs
                                                        • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0083C182
                                                        • GetLastError.KERNEL32 ref: 0083C195
                                                        • SetEvent.KERNEL32(?), ref: 0083C1A9
                                                          • Part of subcall function 0083C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0083C272
                                                          • Part of subcall function 0083C253: GetLastError.KERNEL32 ref: 0083C322
                                                          • Part of subcall function 0083C253: SetEvent.KERNEL32(?), ref: 0083C336
                                                          • Part of subcall function 0083C253: InternetCloseHandle.WININET(00000000), ref: 0083C341
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                        • String ID:
                                                        • API String ID: 337547030-0
                                                        • Opcode ID: 3c5f5ce8dcd88b892bae7295606955a3dae050b54e8220e570441d1ca6d32710
                                                        • Instruction ID: 55a03792e8d970f7e1cb8b637689345fc726e385bf9329e2c6fdd7acb07f66be
                                                        • Opcode Fuzzy Hash: 3c5f5ce8dcd88b892bae7295606955a3dae050b54e8220e570441d1ca6d32710
                                                        • Instruction Fuzzy Hash: CC317871200705AFDB219FA9DC44A6BBBE9FF98301F00442DF956E6610DB34E814EFA0
                                                        APIs
                                                          • Part of subcall function 00823A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00823A57
                                                          • Part of subcall function 00823A3D: GetCurrentThreadId.KERNEL32 ref: 00823A5E
                                                          • Part of subcall function 00823A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008225B3), ref: 00823A65
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 008225BD
                                                        • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 008225DB
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 008225DF
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 008225E9
                                                        • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00822601
                                                        • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00822605
                                                        • MapVirtualKeyW.USER32(00000025,00000000), ref: 0082260F
                                                        • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00822623
                                                        • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00822627
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                        • String ID:
                                                        • API String ID: 2014098862-0
                                                        • Opcode ID: f3729a2411a822b5660c9290ac5975a35eb63dbe1e2289509019801618d7d5ee
                                                        • Instruction ID: aadd33f229d9ee95b329cb83597e25192174aed9aff3668e8486854835b64916
                                                        • Opcode Fuzzy Hash: f3729a2411a822b5660c9290ac5975a35eb63dbe1e2289509019801618d7d5ee
                                                        • Instruction Fuzzy Hash: AE01D431390724BBFB1067689C8AF593F99FB5EB12F100016F318EE1D1C9E624848E6A
                                                        APIs
                                                        • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00821449,?,?,00000000), ref: 0082180C
                                                        • RtlAllocateHeap.NTDLL(00000000,?,00821449), ref: 00821813
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00821449,?,?,00000000), ref: 00821828
                                                        • GetCurrentProcess.KERNEL32(?,00000000,?,00821449,?,?,00000000), ref: 00821830
                                                        • DuplicateHandle.KERNEL32(00000000,?,00821449,?,?,00000000), ref: 00821833
                                                        • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00821449,?,?,00000000), ref: 00821843
                                                        • GetCurrentProcess.KERNEL32(00821449,00000000,?,00821449,?,?,00000000), ref: 0082184B
                                                        • DuplicateHandle.KERNEL32(00000000,?,00821449,?,?,00000000), ref: 0082184E
                                                        • CreateThread.KERNEL32(00000000,00000000,00821874,00000000,00000000,00000000), ref: 00821868
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocateCreateThread
                                                        • String ID:
                                                        • API String ID: 1422014791-0
                                                        • Opcode ID: 21d88d27ecd1774a3c9566dddd3e4035c028c4a0abdc300d2e6ac9c4a8c947a1
                                                        • Instruction ID: c9b630d17981d7986f3ee78d21fa1528d1a997e1db6ebe5b7e38d34d8272e93c
                                                        • Opcode Fuzzy Hash: 21d88d27ecd1774a3c9566dddd3e4035c028c4a0abdc300d2e6ac9c4a8c947a1
                                                        • Instruction Fuzzy Hash: 9101A8B5680708BFEA10ABA5DC4DF6B7BACFB89B11F404411FA05DB2A1CA749844CF20
                                                        APIs
                                                          • Part of subcall function 0082D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0082D501
                                                          • Part of subcall function 0082D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0082D50F
                                                          • Part of subcall function 0082D4DC: CloseHandle.KERNEL32(00000000), ref: 0082D5DC
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0084A16D
                                                        • GetLastError.KERNEL32 ref: 0084A180
                                                        • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0084A1B3
                                                        • TerminateProcess.KERNEL32(00000000,00000000), ref: 0084A268
                                                        • GetLastError.KERNEL32(00000000), ref: 0084A273
                                                        • CloseHandle.KERNEL32(00000000), ref: 0084A2C4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                        • String ID: SeDebugPrivilege
                                                        • API String ID: 2533919879-2896544425
                                                        • Opcode ID: d2bf16a4aa1f7049c5e7c7b6f76de6feb9a4730d7ced1bd3adf7896e0d868302
                                                        • Instruction ID: eb6881e024c5b5ab7fe1706f7e8a1a05c455af64474c84fd168dcbb4e315c2f8
                                                        • Opcode Fuzzy Hash: d2bf16a4aa1f7049c5e7c7b6f76de6feb9a4730d7ced1bd3adf7896e0d868302
                                                        • Instruction Fuzzy Hash: DD617B312442569FD724DF18C498F2ABBA1FF54318F18848CE4668F7A2C7B6ED45CB92
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0082BCFD
                                                        • IsMenu.USER32(00000000), ref: 0082BD1D
                                                        • CreatePopupMenu.USER32 ref: 0082BD53
                                                        • GetMenuItemCount.USER32(01513990), ref: 0082BDA4
                                                        • InsertMenuItemW.USER32(01513990,?,00000001,00000030), ref: 0082BDCC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                        • String ID: 0$2
                                                        • API String ID: 93392585-3793063076
                                                        • Opcode ID: f82b0dd104e58dfa16f17663b70b7898024c85092ba4fa8c7d1fbc892f06d1dd
                                                        • Instruction ID: de5a772d43b379bae56b7f94c523db56320e00e86f5ed700f302b2e3eb224c78
                                                        • Opcode Fuzzy Hash: f82b0dd104e58dfa16f17663b70b7898024c85092ba4fa8c7d1fbc892f06d1dd
                                                        • Instruction Fuzzy Hash: BD51AD70A02329ABDB10CFA8E888BEEBBF4FF45354F148159E851D72D1E7749981CB61
                                                        APIs
                                                        • _ValidateLocalCookies.LIBCMT ref: 007E2D4B
                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 007E2D53
                                                        • _ValidateLocalCookies.LIBCMT ref: 007E2DE1
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 007E2E0C
                                                        • _ValidateLocalCookies.LIBCMT ref: 007E2E61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                        • String ID: &H~$csm
                                                        • API String ID: 1170836740-3418752573
                                                        • Opcode ID: c887d400749ae42c76fbd2a13e09c8f693649b1686cb1ccf9b9b6a8468c5c748
                                                        • Instruction ID: d0d074d5457f3f40d52769fed0f9e79a1335d4f8535167e878daac8cc9d822c1
                                                        • Opcode Fuzzy Hash: c887d400749ae42c76fbd2a13e09c8f693649b1686cb1ccf9b9b6a8468c5c748
                                                        • Instruction Fuzzy Hash: CE41A934E02249EBCF10DF59CC49A9EBBB9BF48314F148155E9149B353D7799A12CB90
                                                        APIs
                                                        • LoadIconW.USER32(00000000,00007F03), ref: 0082C913
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: IconLoad
                                                        • String ID: blank$info$question$stop$warning
                                                        • API String ID: 2457776203-404129466
                                                        • Opcode ID: 0a87fa9c2af5e981d1ae4a9c41bbbb56ffa1539d5d091f14587f66eeffc7ca9d
                                                        • Instruction ID: 72d82e15cff4d987e9a9eb35d4323dcf661ae38b10df57d546cd7a208b041e17
                                                        • Opcode Fuzzy Hash: 0a87fa9c2af5e981d1ae4a9c41bbbb56ffa1539d5d091f14587f66eeffc7ca9d
                                                        • Instruction Fuzzy Hash: 26112E3168931ABAE7006B54AC82CBE2B9CFF15324B50403AF500E6281E7A85DC05768
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$LocalTime
                                                        • String ID:
                                                        • API String ID: 952045576-0
                                                        • Opcode ID: 0e78d5b186ef999d215e9c1f8564f774860e72f32d783fecbb2b65b12c7c2029
                                                        • Instruction ID: 7f4806df5adaee17ab1fc8458681e8bf1a51d50b100a644447daaaabd71efa52
                                                        • Opcode Fuzzy Hash: 0e78d5b186ef999d215e9c1f8564f774860e72f32d783fecbb2b65b12c7c2029
                                                        • Instruction Fuzzy Hash: F1417266C11258B5CB11EBF5888E9CF77ACFF49710F504462E614E3122EB38E655C3E9
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0081682C,00000004,00000000,00000000), ref: 007DF953
                                                        • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0081682C,00000004,00000000,00000000), ref: 0081F3D1
                                                        • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0081682C,00000004,00000000,00000000), ref: 0081F454
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ShowWindow
                                                        • String ID:
                                                        • API String ID: 1268545403-0
                                                        • Opcode ID: 5d780a9bbb6da38b4795f5aa586e4318f437b26760a907e593e278b97cc8f049
                                                        • Instruction ID: a2eac427a6189a2d23532ce8322ffced11f0765e2d626d7494f752f314a3e708
                                                        • Opcode Fuzzy Hash: 5d780a9bbb6da38b4795f5aa586e4318f437b26760a907e593e278b97cc8f049
                                                        • Instruction Fuzzy Hash: 3A410870A08780BECB399B2D88A876A7AB5FF55314F14403EE18BD6761C639B8C0CB11
                                                        APIs
                                                        • DeleteObject.GDI32(00000000), ref: 00852D1B
                                                        • GetDC.USER32(00000000), ref: 00852D23
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00852D2E
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00852D3A
                                                        • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00852D76
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00852D87
                                                        • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00855A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00852DC2
                                                        • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00852DE1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                        • String ID:
                                                        • API String ID: 3864802216-0
                                                        • Opcode ID: 43ae84b9a0ef33d9f480f669aefe49aaa1e490f0b73ea10f39db50510924932a
                                                        • Instruction ID: 465d927982271e0990244e69a0d33e4a28c51290bed385fb4df16cd2400b1a87
                                                        • Opcode Fuzzy Hash: 43ae84b9a0ef33d9f480f669aefe49aaa1e490f0b73ea10f39db50510924932a
                                                        • Instruction Fuzzy Hash: 60316B72201714BFEB118F548C8AFEB3FA9FB1A756F044055FE08DA291C6799C50CBA4
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: 1bc43a31db38b938d5118ffc1f2be9829304ac0af1234a49ead3301be2818235
                                                        • Instruction ID: a538a66cb5c5f305e6b1a26f352b1248adce2ce722fa71f30ce33d0e3e3af508
                                                        • Opcode Fuzzy Hash: 1bc43a31db38b938d5118ffc1f2be9829304ac0af1234a49ead3301be2818235
                                                        • Instruction Fuzzy Hash: 5321B371AC2A69BBD2149525AE82FBB235CFF34395F840030FE05DA686F738ED5481A5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                        • API String ID: 0-572801152
                                                        • Opcode ID: 3db5e5ee6a25ded876790519b51c7c205613a4e2cd1fbb24a5e3ed85560a8d2d
                                                        • Instruction ID: 9f11ed61effe3b1202cb7047dc3749c7ef5e5d2999bcd30fffd3d6591bbfc6b6
                                                        • Opcode Fuzzy Hash: 3db5e5ee6a25ded876790519b51c7c205613a4e2cd1fbb24a5e3ed85560a8d2d
                                                        • Instruction Fuzzy Hash: 99D18C75A0061EAFDB10CFA8C881BAEB7B5FF48344F148469E915EB282E771DD45CB90
                                                        APIs
                                                        • GetCPInfo.KERNEL32(?,?), ref: 008015CE
                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00801651
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 008016E4
                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 008016FB
                                                          • Part of subcall function 007F3820: RtlAllocateHeap.NTDLL(00000000,?,00891444), ref: 007F3852
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00801777
                                                        • __freea.LIBCMT ref: 008017A2
                                                        • __freea.LIBCMT ref: 008017AE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                        • String ID:
                                                        • API String ID: 2829977744-0
                                                        • Opcode ID: 6340e59447d84d55aa3d9393bb76f65ac0c3860d81051305e6a9022f30376dd6
                                                        • Instruction ID: bb0c76376fce074beb8107cf584df1b6695a30720795a44aae83973b680ad5b2
                                                        • Opcode Fuzzy Hash: 6340e59447d84d55aa3d9393bb76f65ac0c3860d81051305e6a9022f30376dd6
                                                        • Instruction Fuzzy Hash: 02919472E0021A9EDF608E64CC89AFE7BB5FF49724F184659E911EB2C5DB25DC40CB60
                                                        APIs
                                                        • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0083125C
                                                        • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00831284
                                                        • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 008312A8
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008312D8
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0083135F
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 008313C4
                                                        • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00831430
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                        • String ID:
                                                        • API String ID: 2550207440-0
                                                        • Opcode ID: a65a068049ace7e3f99c1f7801330a85a73c5532f846ee736ffa366b3127b28a
                                                        • Instruction ID: db9ad9cf690ed972d5f597f4c563a5db164328cda020265339807434eb02d3fc
                                                        • Opcode Fuzzy Hash: a65a068049ace7e3f99c1f7801330a85a73c5532f846ee736ffa366b3127b28a
                                                        • Instruction Fuzzy Hash: 9191D271A002099FDF00DFA8C898BBEB7B5FF84B15F144429E911EB291DB78A941CBD5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: 9b9e114eb9db3d60655231bf17aaae27173a497d8c63be46c8a40e4df4e7dca3
                                                        • Instruction ID: 61d866f9acd12799a97bf74b5ff5cbe1d245edc3120e3526c09602fadbf8fb3f
                                                        • Opcode Fuzzy Hash: 9b9e114eb9db3d60655231bf17aaae27173a497d8c63be46c8a40e4df4e7dca3
                                                        • Instruction Fuzzy Hash: 14912971D40219EFCB10CFA9CC88AEEBBB8FF49320F14455AE516B7291D378A951CB60
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 0084396B
                                                        • CharUpperBuffW.USER32(?,?), ref: 00843A7A
                                                        • _wcslen.LIBCMT ref: 00843A8A
                                                        • VariantClear.OLEAUT32(?), ref: 00843C1F
                                                          • Part of subcall function 00830CDF: VariantInit.OLEAUT32(00000000), ref: 00830D1F
                                                          • Part of subcall function 00830CDF: VariantCopy.OLEAUT32(?,?), ref: 00830D28
                                                          • Part of subcall function 00830CDF: VariantClear.OLEAUT32(?), ref: 00830D34
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                        • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                        • API String ID: 4137639002-1221869570
                                                        • Opcode ID: b360bac3b919116c80d33047ed2db6a11c8e92b9619d012bd2a7062b75381984
                                                        • Instruction ID: e32b35823c0deebf4d2e883ffbf2b600287979f1dac293bcc334f990e347e6ed
                                                        • Opcode Fuzzy Hash: b360bac3b919116c80d33047ed2db6a11c8e92b9619d012bd2a7062b75381984
                                                        • Instruction Fuzzy Hash: 139133746083099FC704EF28C48596AB7E5FF88314F14882EF88A9B351DB35EE45CB92
                                                        APIs
                                                          • Part of subcall function 0082000E: CLSIDFromProgID.COMBASE ref: 0082002B
                                                          • Part of subcall function 0082000E: ProgIDFromCLSID.COMBASE(?,00000000), ref: 00820046
                                                          • Part of subcall function 0082000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0081FF41,80070057,?,?), ref: 00820054
                                                          • Part of subcall function 0082000E: CoTaskMemFree.COMBASE(00000000), ref: 00820064
                                                        • CoInitializeSecurity.COMBASE(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000), ref: 00844C51
                                                        • _wcslen.LIBCMT ref: 00844D59
                                                        • CoCreateInstanceEx.COMBASE(?,00000000,00000015,?,00000001,?), ref: 00844DCF
                                                        • CoTaskMemFree.COMBASE(?), ref: 00844DDA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                        • String ID: NULL Pointer assignment
                                                        • API String ID: 614568839-2785691316
                                                        • Opcode ID: ee8409eddcd176fad81a2e419101f3d161de4b3e0ed908ecb75797b694dd2cdf
                                                        • Instruction ID: aa66dacace15bc8cb718323d6e8f127c38ea22e7319c9290ef5ec586c2490acc
                                                        • Opcode Fuzzy Hash: ee8409eddcd176fad81a2e419101f3d161de4b3e0ed908ecb75797b694dd2cdf
                                                        • Instruction Fuzzy Hash: AC910171D0021DEFDF10DFA4D895AEEB7B9FF08314F10816AE915A7251EB34AA458FA0
                                                        APIs
                                                        • GetMenu.USER32(?), ref: 00852183
                                                        • GetMenuItemCount.USER32(00000000), ref: 008521B5
                                                        • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 008521DD
                                                        • _wcslen.LIBCMT ref: 00852213
                                                        • GetMenuItemID.USER32(?,?), ref: 0085224D
                                                        • GetSubMenu.USER32(?,?), ref: 0085225B
                                                          • Part of subcall function 00823A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00823A57
                                                          • Part of subcall function 00823A3D: GetCurrentThreadId.KERNEL32 ref: 00823A5E
                                                          • Part of subcall function 00823A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008225B3), ref: 00823A65
                                                        • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 008522E3
                                                          • Part of subcall function 0082E97B: Sleep.KERNEL32 ref: 0082E9F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                        • String ID:
                                                        • API String ID: 4196846111-0
                                                        • Opcode ID: 86cbfe6e31c78169f9d3f1819be39778960899f55a505bf36fa127c03fc269f1
                                                        • Instruction ID: e1be0b351cda687cc9927434cd9ff54796521a583a9b2ed18cf335b4c6d9744d
                                                        • Opcode Fuzzy Hash: 86cbfe6e31c78169f9d3f1819be39778960899f55a505bf36fa127c03fc269f1
                                                        • Instruction Fuzzy Hash: 0B718E75A00215EFCB10DF68C885AAEB7F1FF49311F148499E816EB351DB38AE458F90
                                                        APIs
                                                        • GetParent.USER32(?), ref: 0082AEF9
                                                        • GetKeyboardState.USER32(?), ref: 0082AF0E
                                                        • SetKeyboardState.USER32(?), ref: 0082AF6F
                                                        • PostMessageW.USER32(?,00000101,00000010,?), ref: 0082AF9D
                                                        • PostMessageW.USER32(?,00000101,00000011,?), ref: 0082AFBC
                                                        • PostMessageW.USER32(?,00000101,00000012,?), ref: 0082AFFD
                                                        • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0082B020
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: e01d214a18312f96e23d9ba32c685ca4c431f7e567ce949b479f634b164d66da
                                                        • Instruction ID: f2ab9d4218a2f0ad9c03138c5f79e4d342d687dc55fba7224f845ddc7176608a
                                                        • Opcode Fuzzy Hash: e01d214a18312f96e23d9ba32c685ca4c431f7e567ce949b479f634b164d66da
                                                        • Instruction Fuzzy Hash: C951B1A06047E53EFB3A42349945BBA7FE9FF06304F088489E1E5D54C2D7A9ACC4D752
                                                        APIs
                                                        • GetParent.USER32(00000000), ref: 0082AD19
                                                        • GetKeyboardState.USER32(?), ref: 0082AD2E
                                                        • SetKeyboardState.USER32(?), ref: 0082AD8F
                                                        • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0082ADBB
                                                        • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0082ADD8
                                                        • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0082AE17
                                                        • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0082AE38
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessagePost$KeyboardState$Parent
                                                        • String ID:
                                                        • API String ID: 87235514-0
                                                        • Opcode ID: 74eaa447a0190d3c1cdf5af005973c15388e4a6c4e1809911fad57c039cf142f
                                                        • Instruction ID: 8cedbc0c71b72bd2621151c3c16dcbd37962b288b772d8334de72e347d4d7c45
                                                        • Opcode Fuzzy Hash: 74eaa447a0190d3c1cdf5af005973c15388e4a6c4e1809911fad57c039cf142f
                                                        • Instruction Fuzzy Hash: 2A51D3A15047E53EFB3A82249C95B7ABEE8FF46300F088489E1D5D68C2D294ECC9D752
                                                        APIs
                                                        • GetConsoleCP.KERNEL32(00803CD6,?,?,?,?,?,?,?,?,007F5BA3,?,?,00803CD6,?,?), ref: 007F5470
                                                        • __fassign.LIBCMT ref: 007F54EB
                                                        • __fassign.LIBCMT ref: 007F5506
                                                        • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00803CD6,00000005,00000000,00000000), ref: 007F552C
                                                        • WriteFile.KERNEL32(?,00803CD6,00000000,007F5BA3,00000000,?,?,?,?,?,?,?,?,?,007F5BA3,?), ref: 007F554B
                                                        • WriteFile.KERNEL32(?,?,00000001,007F5BA3,00000000,?,?,?,?,?,?,?,?,?,007F5BA3,?), ref: 007F5584
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                        • String ID:
                                                        • API String ID: 1324828854-0
                                                        • Opcode ID: b72c8d1d5839da68faed5349454b5471767cc965807d32cdc4979730b5d5e446
                                                        • Instruction ID: 8532078c2fd2b5b38892178fcf37f877d779258e6778e88addb82ca513a94113
                                                        • Opcode Fuzzy Hash: b72c8d1d5839da68faed5349454b5471767cc965807d32cdc4979730b5d5e446
                                                        • Instruction Fuzzy Hash: 52519F71A006499FDB10CFA8D845AEEBBFAEF09300F14411AE655E7391E634AA51CB60
                                                        APIs
                                                          • Part of subcall function 0084304E: inet_addr.WS2_32(?), ref: 0084307A
                                                          • Part of subcall function 0084304E: _wcslen.LIBCMT ref: 0084309B
                                                        • socket.WS2_32(00000002,00000001,00000006), ref: 00841112
                                                        • WSAGetLastError.WS2_32 ref: 00841121
                                                        • WSAGetLastError.WS2_32 ref: 008411C9
                                                        • closesocket.WS2_32(00000000), ref: 008411F9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                        • String ID:
                                                        • API String ID: 2675159561-0
                                                        • Opcode ID: eadb7250ea3202167d73612e016f212018eb72abb416c1d6499c555d49aada2f
                                                        • Instruction ID: 554d4639b1706e12f6e5c2f3d32779a1eaee9752efc4d98230802471bbdc4bbd
                                                        • Opcode Fuzzy Hash: eadb7250ea3202167d73612e016f212018eb72abb416c1d6499c555d49aada2f
                                                        • Instruction Fuzzy Hash: 5A41D431600208AFDF109F24C889BA9BBE9FF45369F148059F919DB291D774ED81CFA1
                                                        APIs
                                                          • Part of subcall function 0082DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0082CF22,?), ref: 0082DDFD
                                                          • Part of subcall function 0082DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0082CF22,?), ref: 0082DE16
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0082CF45
                                                        • MoveFileW.KERNEL32(?,?), ref: 0082CF7F
                                                        • _wcslen.LIBCMT ref: 0082D005
                                                        • _wcslen.LIBCMT ref: 0082D01B
                                                        • SHFileOperationW.SHELL32(?), ref: 0082D061
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                        • String ID: \*.*
                                                        • API String ID: 3164238972-1173974218
                                                        • Opcode ID: 2109f2629a06ac40e385af27044ed99c2367423613323d68dc2a2a433d81516f
                                                        • Instruction ID: da0c43342e0f4787e4395c3a453c37198e2cc1ab345bc73e0e74f3883c19175b
                                                        • Opcode Fuzzy Hash: 2109f2629a06ac40e385af27044ed99c2367423613323d68dc2a2a433d81516f
                                                        • Instruction Fuzzy Hash: B84155719452299FDF12EBA4DA85EEDB7B8FF08340F1000E6E545EB142EF74A684CB51
                                                        APIs
                                                        • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00852E1C
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00852E4F
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00852E84
                                                        • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00852EB6
                                                        • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00852EE0
                                                        • GetWindowLongW.USER32(00000000,000000F0), ref: 00852EF1
                                                        • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00852F0B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$MessageSend
                                                        • String ID:
                                                        • API String ID: 2178440468-0
                                                        • Opcode ID: a164dac699f67fb3d9715358ad526d03c0ab5ad91ce94326c2518688dced6dee
                                                        • Instruction ID: 2d4f55938f6f6c95453e3dda2d76ab442f5f7f0100582a95d38f22c8cbea5dd2
                                                        • Opcode Fuzzy Hash: a164dac699f67fb3d9715358ad526d03c0ab5ad91ce94326c2518688dced6dee
                                                        • Instruction Fuzzy Hash: 2D31F230604255AFDB21DF58EC8AF653BE1FB9A712F5901A5F901CB2B2CB71B8449B41
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00827769
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0082778F
                                                        • SysAllocString.OLEAUT32(00000000), ref: 00827792
                                                        • SysAllocString.OLEAUT32(?), ref: 008277B0
                                                        • SysFreeString.OLEAUT32(?), ref: 008277B9
                                                        • StringFromGUID2.COMBASE(?,?,00000028), ref: 008277DE
                                                        • SysAllocString.OLEAUT32(?), ref: 008277EC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: f78012cc14d6843d8cf2c2d8de309b8c6aca3627fdc816c675bd41c29498f419
                                                        • Instruction ID: e4fba6bcbcef34ad428fdebeb9315c039c077e5dccea0f0951a0599ff386c2d7
                                                        • Opcode Fuzzy Hash: f78012cc14d6843d8cf2c2d8de309b8c6aca3627fdc816c675bd41c29498f419
                                                        • Instruction Fuzzy Hash: 22219076604329AFDB10DFA9DC88CBB77ACFB097647448025FA15DB290D674DC818B64
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00827842
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00827868
                                                        • SysAllocString.OLEAUT32(00000000), ref: 0082786B
                                                        • SysAllocString.OLEAUT32 ref: 0082788C
                                                        • SysFreeString.OLEAUT32 ref: 00827895
                                                        • StringFromGUID2.COMBASE(?,?,00000028), ref: 008278AF
                                                        • SysAllocString.OLEAUT32(?), ref: 008278BD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                        • String ID:
                                                        • API String ID: 3761583154-0
                                                        • Opcode ID: f2e5cfda159183883f0574ae27d9adf3f6cd82d9cf55496d6bfc65b814825d3a
                                                        • Instruction ID: 6901ff76b9e1789b2c63dadbfe0ff5a2c9eec77c3a76f7154cfead02d2a552a3
                                                        • Opcode Fuzzy Hash: f2e5cfda159183883f0574ae27d9adf3f6cd82d9cf55496d6bfc65b814825d3a
                                                        • Instruction Fuzzy Hash: BD217435604228AFDB109FA9DC8CDAA77ECFB097607508135F915CB2A1D674DC81CB68
                                                        APIs
                                                        • GetStdHandle.KERNEL32(0000000C), ref: 008304F2
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0083052E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CreateHandlePipe
                                                        • String ID: nul
                                                        • API String ID: 1424370930-2873401336
                                                        • Opcode ID: d2087d3a9427f597210d993f0db6f3b81ac8c2bbd96141c652ad79b475deb977
                                                        • Instruction ID: e163939e10db7e051b5effb09a5c1821cc7a90caa99a1c5c10fcc616432454fa
                                                        • Opcode Fuzzy Hash: d2087d3a9427f597210d993f0db6f3b81ac8c2bbd96141c652ad79b475deb977
                                                        • Instruction Fuzzy Hash: 3B214C75500309AFDF209F69DC54A9A7BB4FF84725F204A19F8A1E72E0E7709950CFA0
                                                        APIs
                                                        • GetStdHandle.KERNEL32(000000F6), ref: 008305C6
                                                        • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00830601
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CreateHandlePipe
                                                        • String ID: nul
                                                        • API String ID: 1424370930-2873401336
                                                        • Opcode ID: 18cc0819998b71c8a7b8909f290441e183b41c507ef1422241ed23ca4eccd62d
                                                        • Instruction ID: 39853d01765f1aafac110bde4f354ea7b000bfff32f68dc8217a59583dd548df
                                                        • Opcode Fuzzy Hash: 18cc0819998b71c8a7b8909f290441e183b41c507ef1422241ed23ca4eccd62d
                                                        • Instruction Fuzzy Hash: 332195755003059FDB209F69CC15A9A77E8FFE5B25F200A19F8A1E72D4E7709860CF90
                                                        APIs
                                                          • Part of subcall function 007C600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 007C604C
                                                          • Part of subcall function 007C600E: GetStockObject.GDI32(00000011), ref: 007C6060
                                                          • Part of subcall function 007C600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 007C606A
                                                        • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00854112
                                                        • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0085411F
                                                        • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0085412A
                                                        • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00854139
                                                        • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00854145
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                        • String ID: Msctls_Progress32
                                                        • API String ID: 1025951953-3636473452
                                                        • Opcode ID: 0443d26079f5f24e42d7c802f38c4aed6b1e76811dba5c03a45f5cabecdc6a0f
                                                        • Instruction ID: 1b8eb47718b7362f9d49c91e44d1afd5e88808585149b9dced74be19a6ccf51d
                                                        • Opcode Fuzzy Hash: 0443d26079f5f24e42d7c802f38c4aed6b1e76811dba5c03a45f5cabecdc6a0f
                                                        • Instruction Fuzzy Hash: BD1190B218021DBEEF119E64CC85EE77FADFF18798F105111BA18E2190C6769C619BA4
                                                        APIs
                                                          • Part of subcall function 007FD7A3: _free.LIBCMT ref: 007FD7CC
                                                        • _free.LIBCMT ref: 007FD82D
                                                          • Part of subcall function 007F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007FD7D1,00000000,00000000,00000000,00000000,?,007FD7F8,00000000,00000007,00000000,?,007FDBF5,00000000), ref: 007F29DE
                                                          • Part of subcall function 007F29C8: GetLastError.KERNEL32(00000000,?,007FD7D1,00000000,00000000,00000000,00000000,?,007FD7F8,00000000,00000007,00000000,?,007FDBF5,00000000,00000000), ref: 007F29F0
                                                        • _free.LIBCMT ref: 007FD838
                                                        • _free.LIBCMT ref: 007FD843
                                                        • _free.LIBCMT ref: 007FD897
                                                        • _free.LIBCMT ref: 007FD8A2
                                                        • _free.LIBCMT ref: 007FD8AD
                                                        • _free.LIBCMT ref: 007FD8B8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                        • Instruction ID: 8956c552c3231eaeca6cd31189136c557aecdf09ecc86ff17c0af1eb67743721
                                                        • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                        • Instruction Fuzzy Hash: 3811D07158170CEAD531FFB0CC4BFEB7BDD6F05700F404815B399AA6A2D669B9054A60
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0082DA74
                                                        • LoadStringW.USER32(00000000), ref: 0082DA7B
                                                        • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0082DA91
                                                        • LoadStringW.USER32(00000000), ref: 0082DA98
                                                        • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0082DADC
                                                        Strings
                                                        • %s (%d) : ==> %s: %s %s, xrefs: 0082DAB9
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: HandleLoadModuleString$Message
                                                        • String ID: %s (%d) : ==> %s: %s %s
                                                        • API String ID: 4072794657-3128320259
                                                        • Opcode ID: a943e74e9cd9758b72e2b4fd4559bd38a2cc5c2f25927f4a9e0040bdcb8c8a41
                                                        • Instruction ID: 911b50cd9b55a526dcc1e754163492e4b9f128b59d2b195dce1b40862b0d9a8a
                                                        • Opcode Fuzzy Hash: a943e74e9cd9758b72e2b4fd4559bd38a2cc5c2f25927f4a9e0040bdcb8c8a41
                                                        • Instruction Fuzzy Hash: 3F0162F25003187FE710ABE49D89EEB376CF708306F404495B746E2041EA789E848F74
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(0150D298,0150D298), ref: 0083097B
                                                        • RtlEnterCriticalSection.NTDLL(0150D278), ref: 0083098D
                                                        • TerminateThread.KERNEL32(01508DE0,000001F6), ref: 0083099B
                                                        • WaitForSingleObject.KERNEL32(01508DE0,000003E8), ref: 008309A9
                                                        • CloseHandle.KERNEL32(01508DE0), ref: 008309B8
                                                        • InterlockedExchange.KERNEL32(0150D298,000001F6), ref: 008309C8
                                                        • RtlLeaveCriticalSection.NTDLL(0150D278), ref: 008309CF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                        • String ID:
                                                        • API String ID: 3495660284-0
                                                        • Opcode ID: 64072677c92868a2ad7608ed1a067b0fee388a7d3624dc176e23028ab899c9bf
                                                        • Instruction ID: de54cd6122c0304fce091d4ca059bd18da45b45bc087406504ae3a5680c0b80f
                                                        • Opcode Fuzzy Hash: 64072677c92868a2ad7608ed1a067b0fee388a7d3624dc176e23028ab899c9bf
                                                        • Instruction Fuzzy Hash: 08F0C932442B12AFD7515BA4EE89BDABA69FF45703F802025F202948A1CB7994A5CF91
                                                        APIs
                                                        • GetClientRect.USER32(?,?), ref: 007C5D30
                                                        • GetWindowRect.USER32(?,?), ref: 007C5D71
                                                        • ScreenToClient.USER32(?,?), ref: 007C5D99
                                                        • GetClientRect.USER32(?,?), ref: 007C5ED7
                                                        • GetWindowRect.USER32(?,?), ref: 007C5EF8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Rect$Client$Window$Screen
                                                        • String ID:
                                                        • API String ID: 1296646539-0
                                                        • Opcode ID: 6b0633d66ba4efcbdbd017e14ec76644f7145fe568418c2286e691b47ed0520d
                                                        • Instruction ID: 271895621ad5fa9abeff797ad1726d9ebbf2c521804b77f604c24ad82d709fa3
                                                        • Opcode Fuzzy Hash: 6b0633d66ba4efcbdbd017e14ec76644f7145fe568418c2286e691b47ed0520d
                                                        • Instruction Fuzzy Hash: 08B16C74A0074ADBDB14CFA9C880BEAB7F1FF54310F14951EE8A9D7290DB34AA91DB50
                                                        APIs
                                                        • __allrem.LIBCMT ref: 007F00BA
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007F00D6
                                                        • __allrem.LIBCMT ref: 007F00ED
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007F010B
                                                        • __allrem.LIBCMT ref: 007F0122
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 007F0140
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                        • String ID:
                                                        • API String ID: 1992179935-0
                                                        • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                        • Instruction ID: ed8eba516debf7e20e25c71bd34530234b0fa90510db3706a9678172983557d1
                                                        • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                        • Instruction Fuzzy Hash: 19810772601B0ADBEB209F69CC45B7E73E9EF45724F24453AF611D6782EB78D9008790
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,007E82D9,007E82D9,?,?,?,007F644F,00000001,00000001,8BE85006), ref: 007F6258
                                                        • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,007F644F,00000001,00000001,8BE85006,?,?,?), ref: 007F62DE
                                                        • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 007F63D8
                                                        • __freea.LIBCMT ref: 007F63E5
                                                          • Part of subcall function 007F3820: RtlAllocateHeap.NTDLL(00000000,?,00891444), ref: 007F3852
                                                        • __freea.LIBCMT ref: 007F63EE
                                                        • __freea.LIBCMT ref: 007F6413
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1414292761-0
                                                        • Opcode ID: eaaf6021a9a93cb59f66526b31929e39d02f2097c901a8d9bbb63a21ad703f57
                                                        • Instruction ID: 6715f12537c7d57216114b8bdac2c7034369b8e75b393cbb4050d110aff48719
                                                        • Opcode Fuzzy Hash: eaaf6021a9a93cb59f66526b31929e39d02f2097c901a8d9bbb63a21ad703f57
                                                        • Instruction Fuzzy Hash: C051F072A0021AAFEB258F64CC85EBF77AAEF54750F154229FE05D7240EB38DC44D6A1
                                                        APIs
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                          • Part of subcall function 0084C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0084B6AE,?,?), ref: 0084C9B5
                                                          • Part of subcall function 0084C998: _wcslen.LIBCMT ref: 0084C9F1
                                                          • Part of subcall function 0084C998: _wcslen.LIBCMT ref: 0084CA68
                                                          • Part of subcall function 0084C998: _wcslen.LIBCMT ref: 0084CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0084BCCA
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0084BD25
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0084BD6A
                                                        • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0084BD99
                                                        • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0084BDF3
                                                        • RegCloseKey.ADVAPI32(?), ref: 0084BDFF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                        • String ID:
                                                        • API String ID: 1120388591-0
                                                        • Opcode ID: bbb35be255f816272a4ea364d01aa95fd58a989109c6726c88a52286d3b2e8b8
                                                        • Instruction ID: f988809f679c0635ead9d6dbef5c888ea947a191ae3485fdf042b5734f62e7d5
                                                        • Opcode Fuzzy Hash: bbb35be255f816272a4ea364d01aa95fd58a989109c6726c88a52286d3b2e8b8
                                                        • Instruction Fuzzy Hash: BE817B30208245EFD714DF24C895E2ABBE5FF84308F14899CF5598B2A2DB36ED45CB92
                                                        APIs
                                                        • VariantInit.OLEAUT32(00000035), ref: 0081F7B9
                                                        • SysAllocString.OLEAUT32(00000001), ref: 0081F860
                                                        • VariantCopy.OLEAUT32(0081FA64,00000000), ref: 0081F889
                                                        • VariantClear.OLEAUT32(0081FA64), ref: 0081F8AD
                                                        • VariantCopy.OLEAUT32(0081FA64,00000000), ref: 0081F8B1
                                                        • VariantClear.OLEAUT32(?), ref: 0081F8BB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearCopy$AllocInitString
                                                        • String ID:
                                                        • API String ID: 3859894641-0
                                                        • Opcode ID: 1550baed652b004e7b29f0300e073d6bb06694ce3bd6474cba29d2a9b2a93ddc
                                                        • Instruction ID: 73e8122d6cefbca35046737789ff8a7271073ac84d1546510e992fca1a098e53
                                                        • Opcode Fuzzy Hash: 1550baed652b004e7b29f0300e073d6bb06694ce3bd6474cba29d2a9b2a93ddc
                                                        • Instruction Fuzzy Hash: 4251D731600314FACF10AB65D895BA9B7ACFF45714F14446BEA06DF293DB748C80CB96
                                                        APIs
                                                          • Part of subcall function 007D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007D9BB2
                                                        • BeginPaint.USER32(?,?,?), ref: 007D9241
                                                        • GetWindowRect.USER32(?,?), ref: 007D92A5
                                                        • ScreenToClient.USER32(?,?), ref: 007D92C2
                                                        • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 007D92D3
                                                        • EndPaint.USER32(?,?,?,?,?), ref: 007D9321
                                                        • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 008171EA
                                                          • Part of subcall function 007D9339: BeginPath.GDI32(00000000), ref: 007D9357
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                        • String ID:
                                                        • API String ID: 3050599898-0
                                                        • Opcode ID: 1a00b00203fde40182a5236aafc9bae5ebbc3e0046e28ed1cfe3c0a8fff1b369
                                                        • Instruction ID: d61d1f1d733c9b3c4b5939b8cd8995f0406f0e548fea6f3f3908935a97a6d993
                                                        • Opcode Fuzzy Hash: 1a00b00203fde40182a5236aafc9bae5ebbc3e0046e28ed1cfe3c0a8fff1b369
                                                        • Instruction Fuzzy Hash: 77418C70108301AFDB11EF24CC88FAA7BB8FF55721F14062AFA95D72A1C735A845DB61
                                                        APIs
                                                        • InterlockedExchange.KERNEL32(?,000001F5), ref: 0083080C
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00830847
                                                        • RtlEnterCriticalSection.NTDLL(?), ref: 00830863
                                                        • RtlLeaveCriticalSection.NTDLL(?), ref: 008308DC
                                                        • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 008308F3
                                                        • InterlockedExchange.KERNEL32(?,000001F6), ref: 00830921
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                        • String ID:
                                                        • API String ID: 3368777196-0
                                                        • Opcode ID: 8b4946fff475755f69e08b3b822cff2ae2590788140c9da5908cd9c0146b22f4
                                                        • Instruction ID: d1e5b2c28ffabfba200ff7a1fac268246939e6d7570037f0eaf032b299d6da22
                                                        • Opcode Fuzzy Hash: 8b4946fff475755f69e08b3b822cff2ae2590788140c9da5908cd9c0146b22f4
                                                        • Instruction Fuzzy Hash: 0A415771900205EFDF14AF64DC85A6ABBB9FF44300F1440A9ED05EA296DB34DE64DFA0
                                                        APIs
                                                        • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0081F3AB,00000000,?,?,00000000,?,0081682C,00000004,00000000,00000000), ref: 0085824C
                                                        • EnableWindow.USER32(00000000,00000000), ref: 00858272
                                                        • ShowWindow.USER32(FFFFFFFF,00000000), ref: 008582D1
                                                        • ShowWindow.USER32(00000000,00000004), ref: 008582E5
                                                        • EnableWindow.USER32(00000000,00000001), ref: 0085830B
                                                        • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0085832F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$Show$Enable$MessageSend
                                                        • String ID:
                                                        • API String ID: 642888154-0
                                                        • Opcode ID: 938831d43b666dd30ccaaff32535fc2e85cf5160df0e072278d960e8e884d25f
                                                        • Instruction ID: 2c6d77b5c18af4ec93a42cd992b7f24bb18de8c1c3a2baade0a7be2ee50a7b6c
                                                        • Opcode Fuzzy Hash: 938831d43b666dd30ccaaff32535fc2e85cf5160df0e072278d960e8e884d25f
                                                        • Instruction Fuzzy Hash: F5418234601645EFDF12DF25C899BE47FE1FB0A716F18416AE908DB262CB31A849CF50
                                                        APIs
                                                        • IsWindowVisible.USER32(?), ref: 00824C95
                                                        • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00824CB2
                                                        • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00824CEA
                                                        • _wcslen.LIBCMT ref: 00824D08
                                                        • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00824D10
                                                        • _wcsstr.LIBVCRUNTIME ref: 00824D1A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                        • String ID:
                                                        • API String ID: 72514467-0
                                                        • Opcode ID: 561e1cef34a4723ddd2dd8e69442007346458d2896bffff7f68e9e666e3f195f
                                                        • Instruction ID: dd28442d4a90dabbddc1ca86ba346355c9f8b34949571d950fc34e65d50abc23
                                                        • Opcode Fuzzy Hash: 561e1cef34a4723ddd2dd8e69442007346458d2896bffff7f68e9e666e3f195f
                                                        • Instruction Fuzzy Hash: AA212931204214BBEB155B39FC09E7B7BECEF45750F10507EF805CA192EA65DD4086B0
                                                        APIs
                                                          • Part of subcall function 007C3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,007C3A97,?,?,007C2E7F,?,?,?,00000000), ref: 007C3AC2
                                                        • _wcslen.LIBCMT ref: 0083587B
                                                        • CoInitialize.OLE32(00000000), ref: 00835995
                                                        • CoCreateInstance.COMBASE(0085FCF8,00000000,00000001,0085FB68,?), ref: 008359AE
                                                        • CoUninitialize.COMBASE ref: 008359CC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                        • String ID: .lnk
                                                        • API String ID: 3172280962-24824748
                                                        • Opcode ID: eabed50d84c19956c0ca80865d952a1d0f4d455f975cf44f2a512f3ac6c74677
                                                        • Instruction ID: 01a7f1d309e52f12d0c1413fbf2e2a980b2261b0060e33a89e1d5fed89286de3
                                                        • Opcode Fuzzy Hash: eabed50d84c19956c0ca80865d952a1d0f4d455f975cf44f2a512f3ac6c74677
                                                        • Instruction Fuzzy Hash: 98D14E71608601DFC714EF24C488A2ABBE1FF89724F14885DF88A9B361DB35ED45CB92
                                                        APIs
                                                          • Part of subcall function 00820FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00820FCA
                                                          • Part of subcall function 00820FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00820FD6
                                                          • Part of subcall function 00820FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00820FE5
                                                          • Part of subcall function 00820FB4: RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 00820FEC
                                                          • Part of subcall function 00820FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00821002
                                                        • GetLengthSid.ADVAPI32(?,00000000,00821335), ref: 008217AE
                                                        • GetProcessHeap.KERNEL32(00000008,00000000), ref: 008217BA
                                                        • RtlAllocateHeap.NTDLL(00000000), ref: 008217C1
                                                        • CopySid.ADVAPI32(00000000,00000000,?), ref: 008217DA
                                                        • GetProcessHeap.KERNEL32(00000000,00000000,00821335), ref: 008217EE
                                                        • HeapFree.KERNEL32(00000000), ref: 008217F5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Heap$Process$AllocateInformationToken$CopyErrorFreeLastLength
                                                        • String ID:
                                                        • API String ID: 169236558-0
                                                        • Opcode ID: 4320e387720e33bc5b4c77b4b4483f94086a1f4618c6520ad38e43c2bd2ccd93
                                                        • Instruction ID: d6467e739118b6ca63200cc2b02f3d3322db7a341f4ef359ff5ff37d47d40001
                                                        • Opcode Fuzzy Hash: 4320e387720e33bc5b4c77b4b4483f94086a1f4618c6520ad38e43c2bd2ccd93
                                                        • Instruction Fuzzy Hash: 4B11AC31500715EFDF109FA4EC49BAE7BA9FB95356F204018F441D7255C739A984CF60
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,007E3379,007E2FE5), ref: 007E3390
                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 007E339E
                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 007E33B7
                                                        • SetLastError.KERNEL32(00000000,?,007E3379,007E2FE5), ref: 007E3409
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastValue___vcrt_
                                                        • String ID:
                                                        • API String ID: 3852720340-0
                                                        • Opcode ID: 0dbc8c8959d23f7d67ede6a684bf65653eb877ab69174d18d67701e51c6df1b7
                                                        • Instruction ID: 0923b255494b954ba284a6af4be40a9ddf77b9f07f01be8fd864d7fb989e0aef
                                                        • Opcode Fuzzy Hash: 0dbc8c8959d23f7d67ede6a684bf65653eb877ab69174d18d67701e51c6df1b7
                                                        • Instruction Fuzzy Hash: 1501283220B791FFE726277B7C8D9662A94FB0D3B97300229F410872F1EF694D015664
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,007F5686,00803CD6,?,00000000,?,007F5B6A,?,?,?,?,?,007EE6D1,?,00888A48), ref: 007F2D78
                                                        • _free.LIBCMT ref: 007F2DAB
                                                        • _free.LIBCMT ref: 007F2DD3
                                                        • SetLastError.KERNEL32(00000000,?,?,?,?,007EE6D1,?,00888A48,00000010,007C4F4A,?,?,00000000,00803CD6), ref: 007F2DE0
                                                        • SetLastError.KERNEL32(00000000,?,?,?,?,007EE6D1,?,00888A48,00000010,007C4F4A,?,?,00000000,00803CD6), ref: 007F2DEC
                                                        • _abort.LIBCMT ref: 007F2DF2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_free$_abort
                                                        • String ID:
                                                        • API String ID: 3160817290-0
                                                        • Opcode ID: 3ca95612453d670ada79c4dd5f70e01596be1c2535632a972a228c516dc73c74
                                                        • Instruction ID: 96f3c6fbfbfef75f8e063bb7463c08bfe3b580a4776a3f79dc01745f4bab69a3
                                                        • Opcode Fuzzy Hash: 3ca95612453d670ada79c4dd5f70e01596be1c2535632a972a228c516dc73c74
                                                        • Instruction Fuzzy Hash: 81F0F435645B0CBBC2122738BC0EA7A2559BFC17A1B240118FB24D23A3EE2C88034561
                                                        APIs
                                                          • Part of subcall function 007D9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007D9693
                                                          • Part of subcall function 007D9639: SelectObject.GDI32(?,00000000), ref: 007D96A2
                                                          • Part of subcall function 007D9639: BeginPath.GDI32(?), ref: 007D96B9
                                                          • Part of subcall function 007D9639: SelectObject.GDI32(?,00000000), ref: 007D96E2
                                                        • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00858A4E
                                                        • LineTo.GDI32(?,00000003,00000000), ref: 00858A62
                                                        • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00858A70
                                                        • LineTo.GDI32(?,00000000,00000003), ref: 00858A80
                                                        • EndPath.GDI32(?), ref: 00858A90
                                                        • StrokePath.GDI32(?), ref: 00858AA0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                        • String ID:
                                                        • API String ID: 43455801-0
                                                        • Opcode ID: 2dcadd2afac4907f25f17f2155131f1d0b6e9805fbc3e54ddfedf4cdfe6ffcf4
                                                        • Instruction ID: aef8c4a85c7e9390fee8d5e6de8eb9e53577ec1c876375995974dcea18daed1f
                                                        • Opcode Fuzzy Hash: 2dcadd2afac4907f25f17f2155131f1d0b6e9805fbc3e54ddfedf4cdfe6ffcf4
                                                        • Instruction Fuzzy Hash: 77110976000219FFDF129F90DC88EAA7F6DFB08391F048012FA199A1A1C7729D55DFA0
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 00825218
                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 00825229
                                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00825230
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00825238
                                                        • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0082524F
                                                        • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00825261
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CapsDevice$Release
                                                        • String ID:
                                                        • API String ID: 1035833867-0
                                                        • Opcode ID: 2a97616122b8baf5d1e1747bcb59c5199779ff1a0acce04ff68c77024f1ca849
                                                        • Instruction ID: ffb38f04313ebeffced521fd80cd5bf6cac6b91875ea4586286f1811b7b8eec4
                                                        • Opcode Fuzzy Hash: 2a97616122b8baf5d1e1747bcb59c5199779ff1a0acce04ff68c77024f1ca849
                                                        • Instruction Fuzzy Hash: 09014F75A40718BFEB109BA69C49E5EBFB8FF48752F044065FA04E7281DA749900CFA0
                                                        APIs
                                                        • MapVirtualKeyW.USER32(0000005B,00000000), ref: 007C1BF4
                                                        • MapVirtualKeyW.USER32(00000010,00000000), ref: 007C1BFC
                                                        • MapVirtualKeyW.USER32(000000A0,00000000), ref: 007C1C07
                                                        • MapVirtualKeyW.USER32(000000A1,00000000), ref: 007C1C12
                                                        • MapVirtualKeyW.USER32(00000011,00000000), ref: 007C1C1A
                                                        • MapVirtualKeyW.USER32(00000012,00000000), ref: 007C1C22
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Virtual
                                                        • String ID:
                                                        • API String ID: 4278518827-0
                                                        • Opcode ID: dbcbe7ff841e91a5b37935c495e649e591fd34ea1319ecc12088192f330202e7
                                                        • Instruction ID: 246239c133a2435621cac8e372caf596f171679365a37f04dd9651d48404ebb1
                                                        • Opcode Fuzzy Hash: dbcbe7ff841e91a5b37935c495e649e591fd34ea1319ecc12088192f330202e7
                                                        • Instruction Fuzzy Hash: 980144B0902B5ABDE3008F6A8C85A52FEA8FF19354F00411BA15C4BA42C7B5A864CBE5
                                                        APIs
                                                        • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0082EB30
                                                        • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0082EB46
                                                        • GetWindowThreadProcessId.USER32(?,?), ref: 0082EB55
                                                        • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0082EB64
                                                        • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0082EB6E
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0082EB75
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 839392675-0
                                                        • Opcode ID: 9baac0b712e47b49fd89a8e42dd11749470cb27b7fa543a695878befbaafd31e
                                                        • Instruction ID: 80becd73c53bfe9a63cd898acf7954af3b4648e0219fa92bbbc42e97fceb4c9c
                                                        • Opcode Fuzzy Hash: 9baac0b712e47b49fd89a8e42dd11749470cb27b7fa543a695878befbaafd31e
                                                        • Instruction Fuzzy Hash: 29F01D72140758BFE6215B529C0DEEB7EBCFBCAB12F000159F601D119196A45A418AB5
                                                        APIs
                                                        • GetClientRect.USER32(?), ref: 00817452
                                                        • SendMessageW.USER32(?,00001328,00000000,?), ref: 00817469
                                                        • GetWindowDC.USER32(?), ref: 00817475
                                                        • GetPixel.GDI32(00000000,?,?), ref: 00817484
                                                        • ReleaseDC.USER32(?,00000000), ref: 00817496
                                                        • GetSysColor.USER32(00000005), ref: 008174B0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                        • String ID:
                                                        • API String ID: 272304278-0
                                                        • Opcode ID: 6e24b8aaa6f16bb1da52d5f03d42de1a1c5120babb56ccd3e4effea8a17485b8
                                                        • Instruction ID: b62b6cf5711cee6371131b2645bdd25bc28d526d32efd9f29cf866c5553c1873
                                                        • Opcode Fuzzy Hash: 6e24b8aaa6f16bb1da52d5f03d42de1a1c5120babb56ccd3e4effea8a17485b8
                                                        • Instruction Fuzzy Hash: 4A012431404315EFEB515FA4DC48BEA7BBAFF04322F650168FA16A21A1CB391E91EF50
                                                        APIs
                                                          • Part of subcall function 007C7620: _wcslen.LIBCMT ref: 007C7625
                                                        • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0082C6EE
                                                        • _wcslen.LIBCMT ref: 0082C735
                                                        • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0082C79C
                                                        • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0082C7CA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info_wcslen$Default
                                                        • String ID: 0
                                                        • API String ID: 1227352736-4108050209
                                                        • Opcode ID: ca42fffc91e6d8461144d01af7c16e3ac7fe3e2bdd9d11ed446a8501df3a9ee0
                                                        • Instruction ID: b839aa9af4c6bd609105afce6772574700fabd64a9b0d53a051eabd899cf5d6b
                                                        • Opcode Fuzzy Hash: ca42fffc91e6d8461144d01af7c16e3ac7fe3e2bdd9d11ed446a8501df3a9ee0
                                                        • Instruction Fuzzy Hash: 4251BD716043219FD714AF28E889B7E77E8FF49314F040A2DF996E32A0DB64D984CB52
                                                        APIs
                                                        • ShellExecuteExW.SHELL32(0000003C), ref: 0084AEA3
                                                          • Part of subcall function 007C7620: _wcslen.LIBCMT ref: 007C7625
                                                        • GetProcessId.KERNEL32(00000000), ref: 0084AF38
                                                        • CloseHandle.KERNEL32(00000000), ref: 0084AF67
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CloseExecuteHandleProcessShell_wcslen
                                                        • String ID: <$@
                                                        • API String ID: 146682121-1426351568
                                                        • Opcode ID: 1ba337604d6d876ed8c1b5c575dea221ed71900aa004002bda2ff793e2afe338
                                                        • Instruction ID: 3d34a2c1e2d2c2cf2aae71a14285f540646f7546056359036c5d68317de7604a
                                                        • Opcode Fuzzy Hash: 1ba337604d6d876ed8c1b5c575dea221ed71900aa004002bda2ff793e2afe338
                                                        • Instruction Fuzzy Hash: 94712375A00619DFCB18DF54D488A9EBBB4FF08314F04849DE856AB3A2CB78ED45CB91
                                                        APIs
                                                        • CoCreateInstance.COMBASE(?,00000000,00000005,?,?), ref: 00827206
                                                        • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0082723C
                                                        • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0082724D
                                                        • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 008272CF
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$AddressCreateInstanceProc
                                                        • String ID: DllGetClassObject
                                                        • API String ID: 753597075-1075368562
                                                        • Opcode ID: a7da78526891eddc245bd08a671a5b34b71731706634acfdcb6c91c91d81f32c
                                                        • Instruction ID: dafed3950d79ed56f134074dc00c429f134a201e7ccec8a677c2bf8d6f4c6948
                                                        • Opcode Fuzzy Hash: a7da78526891eddc245bd08a671a5b34b71731706634acfdcb6c91c91d81f32c
                                                        • Instruction Fuzzy Hash: 35418CB1A04214EFDB15CF55D884A9A7BA9FF44314F1480ADFD06DF20AD7B4D984CBA0
                                                        APIs
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                          • Part of subcall function 00823CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00823CCA
                                                        • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00821E66
                                                        • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00821E79
                                                        • SendMessageW.USER32(?,00000189,?,00000000), ref: 00821EA9
                                                          • Part of subcall function 007C6B57: _wcslen.LIBCMT ref: 007C6B6A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen$ClassName
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 2081771294-1403004172
                                                        • Opcode ID: 278a714b408deece1761152435b47c42b8db926abaebc13018d0514b720a214a
                                                        • Instruction ID: 8aef3db14526e634adcd5a60c66c0cd8de73b256097eb29cde560c865018b5ab
                                                        • Opcode Fuzzy Hash: 278a714b408deece1761152435b47c42b8db926abaebc13018d0514b720a214a
                                                        • Instruction Fuzzy Hash: EA21E475A00204AEDB14AB64EC5DDFFB7B9FF65350B20412DF825E72E1DB384E498A20
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                        • API String ID: 176396367-4004644295
                                                        • Opcode ID: a0a1345da9613fc9895e1d664b5f38fb229c31dbe42bf9717f5968f2c80a174d
                                                        • Instruction ID: 82c75f9aac9d37e3def69e193727724589c81d2cb2761a3e99a7522661f8c40c
                                                        • Opcode Fuzzy Hash: a0a1345da9613fc9895e1d664b5f38fb229c31dbe42bf9717f5968f2c80a174d
                                                        • Instruction Fuzzy Hash: DD3128B3A0217E8BCB60EF6D88445BE33AAFBA1750B154029E851EB345FA75CD44D3A0
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00852F8D
                                                        • LoadLibraryW.KERNEL32(?), ref: 00852F94
                                                        • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00852FA9
                                                        • DestroyWindow.USER32(?), ref: 00852FB1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyLibraryLoadWindow
                                                        • String ID: SysAnimate32
                                                        • API String ID: 3529120543-1011021900
                                                        • Opcode ID: 2856b21e2b850bce291ea94f95510b88a47f0b8abdada190a61af1a352be1818
                                                        • Instruction ID: 700c6373995f7a604c8979fbfa59a1e4cacb082810117871b227d161095b8f7f
                                                        • Opcode Fuzzy Hash: 2856b21e2b850bce291ea94f95510b88a47f0b8abdada190a61af1a352be1818
                                                        • Instruction Fuzzy Hash: 67218872204209ABEB205F64AC84EBB37B9FB5A366F100228FD50E6190DF71DC959B60
                                                        APIs
                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,007E4D1E,007F28E9,?,007E4CBE,007F28E9,008888B8,0000000C,007E4E15,007F28E9,00000002), ref: 007E4D8D
                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 007E4DA0
                                                        • FreeLibrary.KERNEL32(00000000,?,?,?,007E4D1E,007F28E9,?,007E4CBE,007F28E9,008888B8,0000000C,007E4E15,007F28E9,00000002,00000000), ref: 007E4DC3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: 94f42eb307fa197bc71cf7ee6ab79edaf17b53c291ff795cfa76e45032451cbb
                                                        • Instruction ID: 5eab3dc45105511779dacae85799ceeb41043b155020d08b0f980085e18e742c
                                                        • Opcode Fuzzy Hash: 94f42eb307fa197bc71cf7ee6ab79edaf17b53c291ff795cfa76e45032451cbb
                                                        • Instruction Fuzzy Hash: DFF03C34A41308BFDB119F95DC49BAEBBA5FB48752F0000A4A905A6260CB795940CF94
                                                        APIs
                                                        • LoadLibraryA.KERNEL32 ref: 0081D3AD
                                                        • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0081D3BF
                                                        • FreeLibrary.KERNEL32(00000000), ref: 0081D3E5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: GetSystemWow64DirectoryW$X64
                                                        • API String ID: 145871493-2590602151
                                                        • Opcode ID: 9aefed68fdd35fddbd1797ec64177a1b07e4ca42d7a95861b4a249b8996514bc
                                                        • Instruction ID: 9e03b24b36164ccf41b693dab37765c7b542682c2c99731ac73739f200054e59
                                                        • Opcode Fuzzy Hash: 9aefed68fdd35fddbd1797ec64177a1b07e4ca42d7a95861b4a249b8996514bc
                                                        • Instruction Fuzzy Hash: F4F020B0845B218FCB7527208C88BEA332CFF11706B548056F822E2204EB78CCC48A92
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,007C4EDD,?,00891418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007C4E9C
                                                        • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 007C4EAE
                                                        • FreeLibrary.KERNEL32(00000000,?,?,007C4EDD,?,00891418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007C4EC0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                        • API String ID: 145871493-3689287502
                                                        • Opcode ID: 3a6901525f8551db5cc390adf1132ba30655313dc4f3bfdf41d1b953679c8bd1
                                                        • Instruction ID: 0180438e53a295bcdb23e3c864451ac7b716d31d007c89b866b38b44a819bd33
                                                        • Opcode Fuzzy Hash: 3a6901525f8551db5cc390adf1132ba30655313dc4f3bfdf41d1b953679c8bd1
                                                        • Instruction Fuzzy Hash: 82E08C36A42B226F92322B25AC28F6B7758BF81F63B06011DFC00E2200DB6CCD0189A1
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00803CDE,?,00891418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007C4E62
                                                        • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 007C4E74
                                                        • FreeLibrary.KERNEL32(00000000,?,?,00803CDE,?,00891418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 007C4E87
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Library$AddressFreeLoadProc
                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                        • API String ID: 145871493-1355242751
                                                        • Opcode ID: c5d2c762857d98098f18a95410e15c92e0279e9ed8e5b8a82b2b5beb340c2c58
                                                        • Instruction ID: 6a58f582c8fbbc271a76b764b192986f5cc580a8ab61cd195e27b5bda36fdff3
                                                        • Opcode Fuzzy Hash: c5d2c762857d98098f18a95410e15c92e0279e9ed8e5b8a82b2b5beb340c2c58
                                                        • Instruction Fuzzy Hash: 6DD01235542B615B56221B297C28E8B7B19FF85F62306051DBD05E2215CF6CCD01CAD0
                                                        APIs
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00832C05
                                                        • DeleteFileW.KERNEL32(?), ref: 00832C87
                                                        • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00832C9D
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00832CAE
                                                        • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00832CC0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: File$Delete$Copy
                                                        • String ID:
                                                        • API String ID: 3226157194-0
                                                        • Opcode ID: 761c1750d8b876f7201be1377ae40b0c1d21728827d7977e229a86b05be9ced6
                                                        • Instruction ID: 65a3f2db11f3e1cf95b1509a1e62df2288aa4bd2011effa981b589d52585c8cf
                                                        • Opcode Fuzzy Hash: 761c1750d8b876f7201be1377ae40b0c1d21728827d7977e229a86b05be9ced6
                                                        • Instruction Fuzzy Hash: 8CB13071901119EBDF21EBA4CC89EDEB77DFF48350F1040AAF509E6151EA35AA448FA1
                                                        APIs
                                                        • GetCurrentProcessId.KERNEL32 ref: 0084A427
                                                        • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0084A435
                                                        • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0084A468
                                                        • CloseHandle.KERNEL32(?), ref: 0084A63D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseCountersCurrentHandleOpen
                                                        • String ID:
                                                        • API String ID: 3488606520-0
                                                        • Opcode ID: 0e837bd46a13baf17327a6134d5edf577a030cc2be288ce1fc2b7866ce29e717
                                                        • Instruction ID: a165496444ab38ac5aadd734e97772b8cb717549b1b0d72639ff175e330b9823
                                                        • Opcode Fuzzy Hash: 0e837bd46a13baf17327a6134d5edf577a030cc2be288ce1fc2b7866ce29e717
                                                        • Instruction Fuzzy Hash: A5A18C71644300AFD724DF24D886F2AB7E5EB88714F14885DF59ADB392DBB4EC418B82
                                                        APIs
                                                          • Part of subcall function 00843149: select.WS2_32(00000000,?,00000000,00000000,?), ref: 00843195
                                                        • __WSAFDIsSet.WS2_32(00000000,?), ref: 00841DC0
                                                        • WSAGetLastError.WS2_32 ref: 00841DF2
                                                        • inet_ntoa.WS2_32(?), ref: 00841E8C
                                                        • htons.WS2_32(?), ref: 00841EDB
                                                        • _strlen.LIBCMT ref: 00841F35
                                                          • Part of subcall function 008239E8: _strlen.LIBCMT ref: 008239F2
                                                          • Part of subcall function 007C6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,007DCF58,?,?,?), ref: 007C6DBA
                                                          • Part of subcall function 007C6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,007DCF58,?,?,?), ref: 007C6DED
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                        • String ID:
                                                        • API String ID: 1923757996-0
                                                        • Opcode ID: f3a07c48d899018fbfd9b2a74edb68768e7465562e5f40b5119af9c490b32cec
                                                        • Instruction ID: 05be8247832c449699425b212ea4eff81147d95365b0ba02cb15211a66ed909d
                                                        • Opcode Fuzzy Hash: f3a07c48d899018fbfd9b2a74edb68768e7465562e5f40b5119af9c490b32cec
                                                        • Instruction Fuzzy Hash: 6EA1CF31204344AFC724DB24C889F2ABBA5FF84318F54895CF4569B2A2CB35ED86CB91
                                                        APIs
                                                          • Part of subcall function 0082DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0082CF22,?), ref: 0082DDFD
                                                          • Part of subcall function 0082DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0082CF22,?), ref: 0082DE16
                                                          • Part of subcall function 0082E199: GetFileAttributesW.KERNEL32(?,0082CF95), ref: 0082E19A
                                                        • lstrcmpiW.KERNEL32(?,?), ref: 0082E473
                                                        • MoveFileW.KERNEL32(?,?), ref: 0082E4AC
                                                        • _wcslen.LIBCMT ref: 0082E5EB
                                                        • _wcslen.LIBCMT ref: 0082E603
                                                        • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0082E650
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                        • String ID:
                                                        • API String ID: 3183298772-0
                                                        • Opcode ID: 67278bade5b4546ee29210f9ef25843a5c2e5eacf8c742fec1e616a9ff5cf61c
                                                        • Instruction ID: 4f4fbf2e2602a0c7717cef155ad2ba019bfd4525c5b30858794b72332d4d42f6
                                                        • Opcode Fuzzy Hash: 67278bade5b4546ee29210f9ef25843a5c2e5eacf8c742fec1e616a9ff5cf61c
                                                        • Instruction Fuzzy Hash: 185163B24087959BC724EB94DC859DFB3DCEF84340F40492EF689D3151EF74A588876A
                                                        APIs
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                          • Part of subcall function 0084C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0084B6AE,?,?), ref: 0084C9B5
                                                          • Part of subcall function 0084C998: _wcslen.LIBCMT ref: 0084C9F1
                                                          • Part of subcall function 0084C998: _wcslen.LIBCMT ref: 0084CA68
                                                          • Part of subcall function 0084C998: _wcslen.LIBCMT ref: 0084CA9E
                                                        • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0084BAA5
                                                        • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0084BB00
                                                        • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0084BB63
                                                        • RegCloseKey.ADVAPI32(?,?), ref: 0084BBA6
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0084BBB3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                        • String ID:
                                                        • API String ID: 826366716-0
                                                        • Opcode ID: 089d272ba092471170a56a2d79c218082ce658e70eccb39eb0ec4d2be7c2d828
                                                        • Instruction ID: 6698f8772486a672c83b1ebd6f79e21d69370b4746a05896393e3d2245df9f7b
                                                        • Opcode Fuzzy Hash: 089d272ba092471170a56a2d79c218082ce658e70eccb39eb0ec4d2be7c2d828
                                                        • Instruction Fuzzy Hash: E061AE31208245EFD714DF24C895E2ABBE5FF84318F14895CF4998B2A2DB35ED45CB92
                                                        APIs
                                                        • VariantInit.OLEAUT32(?), ref: 00828BCD
                                                        • VariantClear.OLEAUT32 ref: 00828C3E
                                                        • VariantClear.OLEAUT32 ref: 00828C9D
                                                        • VariantClear.OLEAUT32(?), ref: 00828D10
                                                        • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00828D3B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Variant$Clear$ChangeInitType
                                                        • String ID:
                                                        • API String ID: 4136290138-0
                                                        • Opcode ID: c22fff47b16a4003b207e863d9d578ed6f009878c319bdf0ffbf20b2f16a5957
                                                        • Instruction ID: 1aa78ab92a93ed75bb40975a9d72e5bff6dbe6e35c0b4762806b6d2fc4c9bedd
                                                        • Opcode Fuzzy Hash: c22fff47b16a4003b207e863d9d578ed6f009878c319bdf0ffbf20b2f16a5957
                                                        • Instruction Fuzzy Hash: E65188B5A01219EFDB10CF68D884EAAB7F8FF89314B118559E909DB350E734E951CFA0
                                                        APIs
                                                        • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00838BAE
                                                        • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00838BDA
                                                        • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00838C32
                                                        • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00838C57
                                                        • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00838C5F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: PrivateProfile$SectionWrite$String
                                                        • String ID:
                                                        • API String ID: 2832842796-0
                                                        • Opcode ID: ae940e1771e72be8abd207c775400bdb57dd1b1b66cc84d7f6c52c357310c9de
                                                        • Instruction ID: 568ba8311af31cc400d7af912b04a6b00a9afbed80b3b0e41bdf1ecb21702514
                                                        • Opcode Fuzzy Hash: ae940e1771e72be8abd207c775400bdb57dd1b1b66cc84d7f6c52c357310c9de
                                                        • Instruction Fuzzy Hash: E7510535A00215DFCB05DF64C885E69BBF5FF48314F088459E849AB362DB39ED51DB90
                                                        APIs
                                                        • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00848F40
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00848FD0
                                                        • GetProcAddress.KERNEL32(00000000,00000000), ref: 00848FEC
                                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00849032
                                                        • FreeLibrary.KERNEL32(00000000), ref: 00849052
                                                          • Part of subcall function 007DF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00831043,?,753CE610), ref: 007DF6E6
                                                          • Part of subcall function 007DF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0081FA64,00000000,00000000,?,?,00831043,?,753CE610,?,0081FA64), ref: 007DF70D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                        • String ID:
                                                        • API String ID: 666041331-0
                                                        • Opcode ID: 667f09b2d58a00e97d3533dcd6a9c5015347f9ebb29c17b93d4b13e4895d532f
                                                        • Instruction ID: 5becd9a1cbb0874eaddc89060dc2ca36eb3b778e715a3416e103641f3666c16f
                                                        • Opcode Fuzzy Hash: 667f09b2d58a00e97d3533dcd6a9c5015347f9ebb29c17b93d4b13e4895d532f
                                                        • Instruction Fuzzy Hash: CE511735600609DFC715DF68C498DADBBF1FF49314B0580A9E84A9B362DB35ED85CB90
                                                        APIs
                                                        • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00856C33
                                                        • SetWindowLongW.USER32(?,000000EC,?), ref: 00856C4A
                                                        • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00856C73
                                                        • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0083AB79,00000000,00000000), ref: 00856C98
                                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00856CC7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$MessageSendShow
                                                        • String ID:
                                                        • API String ID: 3688381893-0
                                                        • Opcode ID: 4b1fb35c5d4a7a0664b4f44005029fd13b97b7dc0af1cccb396fcf2bb0d0b559
                                                        • Instruction ID: 2e83d2902cb20d625800660c7c5de9edcdd7cac45d5de2425569602ea22b26aa
                                                        • Opcode Fuzzy Hash: 4b1fb35c5d4a7a0664b4f44005029fd13b97b7dc0af1cccb396fcf2bb0d0b559
                                                        • Instruction Fuzzy Hash: 5041D635A04204AFDB24DF28CC59FA97FA5FB09365F940228FC95E72E0E371AD65CA40
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID:
                                                        • API String ID: 269201875-0
                                                        • Opcode ID: 3a4c1a8cd245ecc0b26260792068cada884d0b955ccc05ec1e1a8ddcc093ca5e
                                                        • Instruction ID: d8ae56b6296fb84adb53279e384412e128ebe68d5254ccae692a6ad53e03112e
                                                        • Opcode Fuzzy Hash: 3a4c1a8cd245ecc0b26260792068cada884d0b955ccc05ec1e1a8ddcc093ca5e
                                                        • Instruction Fuzzy Hash: 0041F232A00208DFCB20DF78C884A6DB7F5EF89314F1545A9E615EB392DB35AD02CB90
                                                        APIs
                                                        • GetCursorPos.USER32(?), ref: 007D9141
                                                        • ScreenToClient.USER32(00000000,?), ref: 007D915E
                                                        • GetAsyncKeyState.USER32(00000001), ref: 007D9183
                                                        • GetAsyncKeyState.USER32(00000002), ref: 007D919D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: AsyncState$ClientCursorScreen
                                                        • String ID:
                                                        • API String ID: 4210589936-0
                                                        • Opcode ID: 6a19b51430905938e80140157afd70bb052bc24f7a598f388f5eb5b0e482e03a
                                                        • Instruction ID: 5adba376d4f3edb220890b28aa70aa4e889677c6fd7aa92f28901422ea0a5364
                                                        • Opcode Fuzzy Hash: 6a19b51430905938e80140157afd70bb052bc24f7a598f388f5eb5b0e482e03a
                                                        • Instruction Fuzzy Hash: 5641607190860AFBDF199F68C848BEEB775FF05324F20421AE525A3290D7356D94CF51
                                                        APIs
                                                        • GetInputState.USER32 ref: 008338CB
                                                        • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00833922
                                                        • TranslateMessage.USER32(?), ref: 0083394B
                                                        • DispatchMessageW.USER32(?), ref: 00833955
                                                        • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00833966
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                        • String ID:
                                                        • API String ID: 2256411358-0
                                                        • Opcode ID: d6d43aeb55e94851ab491fdb28966b434f67d4d61d1640c98c1e2dd87479848a
                                                        • Instruction ID: 433fae251bf93c34df21886206db8da64c00b6a4d7ce90a077012e00e9ee309d
                                                        • Opcode Fuzzy Hash: d6d43aeb55e94851ab491fdb28966b434f67d4d61d1640c98c1e2dd87479848a
                                                        • Instruction Fuzzy Hash: 34310670508346DFEF25DB34D809BB67FA8FB86304F08046AE862D25A0E3F49685DB91
                                                        APIs
                                                        • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0083C21E,00000000), ref: 0083CF38
                                                        • InternetReadFile.WININET(?,00000000,?,?), ref: 0083CF6F
                                                        • GetLastError.KERNEL32(?,00000000,?,?,?,0083C21E,00000000), ref: 0083CFB4
                                                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,0083C21E,00000000), ref: 0083CFC8
                                                        • SetEvent.KERNEL32(?,?,00000000,?,?,?,0083C21E,00000000), ref: 0083CFF2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                        • String ID:
                                                        • API String ID: 3191363074-0
                                                        • Opcode ID: 897b48195219c45bcc1d43f95b741cbb7308c221858be4d36c4087110e2f3f2b
                                                        • Instruction ID: 43d6b3dbdce73e584282f2b181642544464580551f0bdf31bcf71047d4ee2ee7
                                                        • Opcode Fuzzy Hash: 897b48195219c45bcc1d43f95b741cbb7308c221858be4d36c4087110e2f3f2b
                                                        • Instruction Fuzzy Hash: 99313A71600709EFDB20DFA5C8849AABBF9FB54355F10442EE506E2241DB74AE419BA0
                                                        APIs
                                                        • GetWindowRect.USER32(?,?), ref: 00821915
                                                        • PostMessageW.USER32(00000001,00000201,00000001), ref: 008219C1
                                                        • Sleep.KERNEL32(00000000,?,?,?), ref: 008219C9
                                                        • PostMessageW.USER32(00000001,00000202,00000000), ref: 008219DA
                                                        • Sleep.KERNEL32(00000000,?,?,?,?), ref: 008219E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessagePostSleep$RectWindow
                                                        • String ID:
                                                        • API String ID: 3382505437-0
                                                        • Opcode ID: 482e5714fe81da1d791e86ea98de9b351047bee348a4c8c5de465cae182133a4
                                                        • Instruction ID: 6003c4fcab7b3875b63584d6e356ab33dbd48247e44e398b5cba1a154ce39ea9
                                                        • Opcode Fuzzy Hash: 482e5714fe81da1d791e86ea98de9b351047bee348a4c8c5de465cae182133a4
                                                        • Instruction Fuzzy Hash: 60319C71A00229EFCB00CFA8D99DA9E7BB5FB14315F204229F921E72D1C7709A84CB90
                                                        APIs
                                                        • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00855745
                                                        • SendMessageW.USER32(?,00001074,?,00000001), ref: 0085579D
                                                        • _wcslen.LIBCMT ref: 008557AF
                                                        • _wcslen.LIBCMT ref: 008557BA
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00855816
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$_wcslen
                                                        • String ID:
                                                        • API String ID: 763830540-0
                                                        • Opcode ID: e81af5807344a4929e8ea26ed912c052deca3d92690b5f52520e54c7581a74c2
                                                        • Instruction ID: 04758a8592c7ddba432d8f8bbfe16a9a1aa9ce52a40b5bb47db7bfdc97198de4
                                                        • Opcode Fuzzy Hash: e81af5807344a4929e8ea26ed912c052deca3d92690b5f52520e54c7581a74c2
                                                        • Instruction Fuzzy Hash: C721B671904618DBDB209FA0DC84AEE7BB9FF04326F108256FD29EB180D7749A89CF50
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 007D98CC
                                                        • SetTextColor.GDI32(?,?), ref: 007D98D6
                                                        • SetBkMode.GDI32(?,00000001), ref: 007D98E9
                                                        • GetStockObject.GDI32(00000005), ref: 007D98F1
                                                        • GetWindowLongW.USER32(?,000000EB), ref: 007D9952
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Color$LongModeObjectStockTextWindow
                                                        • String ID:
                                                        • API String ID: 1860813098-0
                                                        • Opcode ID: 113f3c7c4175d095e63c7cca875cc2500082514d7c674bdcb800118874a6354b
                                                        • Instruction ID: 6c3bd15fac99ba27b16da6a12ad5fe53bac310ac133d954ecc7888ff119c3c24
                                                        • Opcode Fuzzy Hash: 113f3c7c4175d095e63c7cca875cc2500082514d7c674bdcb800118874a6354b
                                                        • Instruction Fuzzy Hash: 5E21F6714453909FCB114F24ECA8BE53FB4AF67722F18418EE6D28B2A2D7396991DF10
                                                        APIs
                                                        • IsWindow.USER32(00000000), ref: 00840951
                                                        • GetForegroundWindow.USER32 ref: 00840968
                                                        • GetDC.USER32(00000000), ref: 008409A4
                                                        • GetPixel.GDI32(00000000,?,00000003), ref: 008409B0
                                                        • ReleaseDC.USER32(00000000,00000003), ref: 008409E8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$ForegroundPixelRelease
                                                        • String ID:
                                                        • API String ID: 4156661090-0
                                                        • Opcode ID: 3af64c8934a9a0967a0de8ff7cf831d375bb6862f6b0abd5801a22ab6d9c61ab
                                                        • Instruction ID: 5feab19f172e2a157ba23acba481e9e0704f8b8346f1e2369203c86be98f9148
                                                        • Opcode Fuzzy Hash: 3af64c8934a9a0967a0de8ff7cf831d375bb6862f6b0abd5801a22ab6d9c61ab
                                                        • Instruction Fuzzy Hash: 76215E35A00214AFD704EF69D889AAEBBE5FF48701F04846CE84AD7752CA34AD04CF90
                                                        APIs
                                                        • GetEnvironmentStringsW.KERNEL32 ref: 007FCDC6
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 007FCDE9
                                                          • Part of subcall function 007F3820: RtlAllocateHeap.NTDLL(00000000,?,00891444), ref: 007F3852
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 007FCE0F
                                                        • _free.LIBCMT ref: 007FCE22
                                                        • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 007FCE31
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                        • String ID:
                                                        • API String ID: 336800556-0
                                                        • Opcode ID: c5c4377698c40a5cca6f1c963d0089b9db2140fe9c5a75aecf606609ea95a577
                                                        • Instruction ID: 2dd39d26fa96b5d0ea6bf42ef8afcbdc20bf4927922c2ac97548dae54f06f957
                                                        • Opcode Fuzzy Hash: c5c4377698c40a5cca6f1c963d0089b9db2140fe9c5a75aecf606609ea95a577
                                                        • Instruction Fuzzy Hash: F4018472A0171D7F23221AB66D8CDBB796DEEC6BA1315012DFA05D7301EA6D8D0195F0
                                                        APIs
                                                        • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007D9693
                                                        • SelectObject.GDI32(?,00000000), ref: 007D96A2
                                                        • BeginPath.GDI32(?), ref: 007D96B9
                                                        • SelectObject.GDI32(?,00000000), ref: 007D96E2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ObjectSelect$BeginCreatePath
                                                        • String ID:
                                                        • API String ID: 3225163088-0
                                                        • Opcode ID: df9e92dcdc1af6fe69215619716cace11b226a9f0a52555dc12bddd3e36186ab
                                                        • Instruction ID: d86df606e073bfdd567d7daa37d796d1dac06124dbc2e54dabb1268f7c2af874
                                                        • Opcode Fuzzy Hash: df9e92dcdc1af6fe69215619716cace11b226a9f0a52555dc12bddd3e36186ab
                                                        • Instruction Fuzzy Hash: 5A215E30806306EFDF11AF65EC187A97FB8BB50366F984217F511A62B0D3799892CF94
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _memcmp
                                                        • String ID:
                                                        • API String ID: 2931989736-0
                                                        • Opcode ID: a41b76d6546ab49039c907c2c37a7802e0959804ba92bc35303e2228d9729d8e
                                                        • Instruction ID: dfeb58b4bcc09ce28ae484b29b1b0c6ae9f5d4f5a7f6124f5bd00c8ff50e0b82
                                                        • Opcode Fuzzy Hash: a41b76d6546ab49039c907c2c37a7802e0959804ba92bc35303e2228d9729d8e
                                                        • Instruction Fuzzy Hash: 3E01F5716C2669FFD2089115AE86FBB734DFB243A9F404030FE04DA242F734ED5482A1
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,?,007EF2DE,007F3863,00891444,?,007DFDF5,?,?,007CA976,00000010,00891440,007C13FC,?,007C13C6), ref: 007F2DFD
                                                        • _free.LIBCMT ref: 007F2E32
                                                        • _free.LIBCMT ref: 007F2E59
                                                        • SetLastError.KERNEL32(00000000,007C1129), ref: 007F2E66
                                                        • SetLastError.KERNEL32(00000000,007C1129), ref: 007F2E6F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$_free
                                                        • String ID:
                                                        • API String ID: 3170660625-0
                                                        • Opcode ID: 11b1492a215e0967ae2e3ce84aaf897ee3df38b9572e1d53f0f7b541412e9d8e
                                                        • Instruction ID: 3398ad435ec4d23e38243023221c4ee450bd55c791aa2c230f0f85f8d018e4ed
                                                        • Opcode Fuzzy Hash: 11b1492a215e0967ae2e3ce84aaf897ee3df38b9572e1d53f0f7b541412e9d8e
                                                        • Instruction Fuzzy Hash: 2301F43624570CEBC61267746C8DD7B2A59BBC17B5B340129FB21E23A3EA7C8C034520
                                                        APIs
                                                        • CLSIDFromProgID.COMBASE ref: 0082002B
                                                        • ProgIDFromCLSID.COMBASE(?,00000000), ref: 00820046
                                                        • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0081FF41,80070057,?,?), ref: 00820054
                                                        • CoTaskMemFree.COMBASE(00000000), ref: 00820064
                                                        • CLSIDFromString.COMBASE(?,?), ref: 00820070
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: From$Prog$FreeStringTasklstrcmpi
                                                        • String ID:
                                                        • API String ID: 3897988419-0
                                                        • Opcode ID: 9b53beaf9ce4bc521a4243136f7655acf0a61b81b3992b8889a742f7350980e8
                                                        • Instruction ID: 232f63ac15f5abd6575653fa9d3b1e5e76d3cad68122e55b567d3de37124282c
                                                        • Opcode Fuzzy Hash: 9b53beaf9ce4bc521a4243136f7655acf0a61b81b3992b8889a742f7350980e8
                                                        • Instruction Fuzzy Hash: 2601A276A00724BFEB104F68EC44BAA7AEDFF44752F144124F905D2222E775DD808FA0
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 0082E997
                                                        • QueryPerformanceFrequency.KERNEL32(?), ref: 0082E9A5
                                                        • Sleep.KERNEL32(00000000), ref: 0082E9AD
                                                        • QueryPerformanceCounter.KERNEL32(?), ref: 0082E9B7
                                                        • Sleep.KERNEL32 ref: 0082E9F3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                        • String ID:
                                                        • API String ID: 2833360925-0
                                                        • Opcode ID: c10bf463f27f2a538d25b6879a1a78c8412d26c20016ed73b5c6feba069e9622
                                                        • Instruction ID: fdc7a1f8d45e2e8203036776ad561e489e67a4b65a1f2d2fafd032fd18b0f6b9
                                                        • Opcode Fuzzy Hash: c10bf463f27f2a538d25b6879a1a78c8412d26c20016ed73b5c6feba069e9622
                                                        • Instruction Fuzzy Hash: ED010531C01A3DDBCF40ABE5E859AEDBB78FB09701F000556E502F2291CB3495948BA6
                                                        APIs
                                                        • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00821114
                                                        • GetLastError.KERNEL32(?,00000000,00000000,?,?,00820B9B,?,?,?), ref: 00821120
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00820B9B,?,?,?), ref: 0082112F
                                                        • RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 00821136
                                                        • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0082114D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: HeapObjectSecurityUser$AllocateErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 883493501-0
                                                        • Opcode ID: 44a7f7026a636921c767a8ec5fdff2bf55f566764a6c5ae5db0e77e55be6fce3
                                                        • Instruction ID: 3569eec15e3533e4d67b25a3f4af53c2c52a85fb0f3c77e6595099df428b8953
                                                        • Opcode Fuzzy Hash: 44a7f7026a636921c767a8ec5fdff2bf55f566764a6c5ae5db0e77e55be6fce3
                                                        • Instruction Fuzzy Hash: 97014675200315BFDB114BA8EC4DA6A3FAEFF892A1B200418FA41D2360EA35DC50CE60
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00820FCA
                                                        • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00820FD6
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00820FE5
                                                        • RtlAllocateHeap.NTDLL(00000000,?,00000002), ref: 00820FEC
                                                        • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00821002
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocateErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 47921759-0
                                                        • Opcode ID: 90389e75299a2ab56ca4404f1d2f52bd7c73eefa4457d6b6bd2dadd6ffefe834
                                                        • Instruction ID: e94f0386d9b3379d889e94b37a777506565b4c839b2d7478b123d39492115a00
                                                        • Opcode Fuzzy Hash: 90389e75299a2ab56ca4404f1d2f52bd7c73eefa4457d6b6bd2dadd6ffefe834
                                                        • Instruction Fuzzy Hash: DDF04935240B15AFDB214FA5AC4DF5A3BADFF89B62F604414FA46C6291CA74DC808E60
                                                        APIs
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0082102A
                                                        • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00821036
                                                        • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00821045
                                                        • RtlAllocateHeap.NTDLL(00000000,?,TokenIntegrityLevel), ref: 0082104C
                                                        • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00821062
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: HeapInformationToken$AllocateErrorLastProcess
                                                        • String ID:
                                                        • API String ID: 47921759-0
                                                        • Opcode ID: ab714eef816441c8fd6ea2b6e60cbbfa141733c05142948490fb4be0a32990ff
                                                        • Instruction ID: cc6a4774cab0dd0a848ff6bb902f8d3644910f751a61712b16a37118e4d3ec68
                                                        • Opcode Fuzzy Hash: ab714eef816441c8fd6ea2b6e60cbbfa141733c05142948490fb4be0a32990ff
                                                        • Instruction Fuzzy Hash: 55F04935240B55AFDB219FA5EC4DF5A3BADFF89762F200414FA46C6290CA74D8808E60
                                                        APIs
                                                        • CloseHandle.KERNEL32(?,?,?,?,0083017D,?,008332FC,?,00000001,00802592,?), ref: 00830324
                                                        • CloseHandle.KERNEL32(?,?,?,?,0083017D,?,008332FC,?,00000001,00802592,?), ref: 00830331
                                                        • CloseHandle.KERNEL32(?,?,?,?,0083017D,?,008332FC,?,00000001,00802592,?), ref: 0083033E
                                                        • CloseHandle.KERNEL32(?,?,?,?,0083017D,?,008332FC,?,00000001,00802592,?), ref: 0083034B
                                                        • CloseHandle.KERNEL32(?,?,?,?,0083017D,?,008332FC,?,00000001,00802592,?), ref: 00830358
                                                        • CloseHandle.KERNEL32(?,?,?,?,0083017D,?,008332FC,?,00000001,00802592,?), ref: 00830365
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CloseHandle
                                                        • String ID:
                                                        • API String ID: 2962429428-0
                                                        • Opcode ID: f9ed309813edaf03c1a124d14681fb5d975231f5aff9e740aec149f0d7083591
                                                        • Instruction ID: 0032c67647c106c7a78eaedce86665800cc18e94ae45d8238dcdfcf610c3fd0a
                                                        • Opcode Fuzzy Hash: f9ed309813edaf03c1a124d14681fb5d975231f5aff9e740aec149f0d7083591
                                                        • Instruction Fuzzy Hash: C801A272800B159FCB309F66D890412F7F9FF903157158A3FD19692A31C371A954CF80
                                                        APIs
                                                        • _free.LIBCMT ref: 007FD752
                                                          • Part of subcall function 007F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007FD7D1,00000000,00000000,00000000,00000000,?,007FD7F8,00000000,00000007,00000000,?,007FDBF5,00000000), ref: 007F29DE
                                                          • Part of subcall function 007F29C8: GetLastError.KERNEL32(00000000,?,007FD7D1,00000000,00000000,00000000,00000000,?,007FD7F8,00000000,00000007,00000000,?,007FDBF5,00000000,00000000), ref: 007F29F0
                                                        • _free.LIBCMT ref: 007FD764
                                                        • _free.LIBCMT ref: 007FD776
                                                        • _free.LIBCMT ref: 007FD788
                                                        • _free.LIBCMT ref: 007FD79A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: 629525ab6f0a0bc8770618741b5fc5bef7dd84ecbbaabc0474d4b72d0c84ef16
                                                        • Instruction ID: 4b466713ea8e07440c39715a166b7fdad3b1d5eb9371f90eed8016521ef8a74b
                                                        • Opcode Fuzzy Hash: 629525ab6f0a0bc8770618741b5fc5bef7dd84ecbbaabc0474d4b72d0c84ef16
                                                        • Instruction Fuzzy Hash: AEF0FF3259420DAB8621FB68F9C5C3A7BDEBB447107A40805F258EB626C778FC808B74
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003E9), ref: 00825C58
                                                        • GetWindowTextW.USER32(00000000,?,00000100), ref: 00825C6F
                                                        • MessageBeep.USER32(00000000), ref: 00825C87
                                                        • KillTimer.USER32(?,0000040A), ref: 00825CA3
                                                        • EndDialog.USER32(?,00000001), ref: 00825CBD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                        • String ID:
                                                        • API String ID: 3741023627-0
                                                        • Opcode ID: 117d3687f61f19dcfdfe37ffa49d38e08f743ea562641f5290d9f033d277b3f6
                                                        • Instruction ID: be93153f7922a6dd4a2b4dfb98b64f5fb8adb85983f935eb60e50cb974736ca3
                                                        • Opcode Fuzzy Hash: 117d3687f61f19dcfdfe37ffa49d38e08f743ea562641f5290d9f033d277b3f6
                                                        • Instruction Fuzzy Hash: D3018170540B14AFEB215B50ED5EFA677F8FB14B46F00055DA583A14E1EBF8AA888E90
                                                        APIs
                                                        • _free.LIBCMT ref: 007F22BE
                                                          • Part of subcall function 007F29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,007FD7D1,00000000,00000000,00000000,00000000,?,007FD7F8,00000000,00000007,00000000,?,007FDBF5,00000000), ref: 007F29DE
                                                          • Part of subcall function 007F29C8: GetLastError.KERNEL32(00000000,?,007FD7D1,00000000,00000000,00000000,00000000,?,007FD7F8,00000000,00000007,00000000,?,007FDBF5,00000000,00000000), ref: 007F29F0
                                                        • _free.LIBCMT ref: 007F22D0
                                                        • _free.LIBCMT ref: 007F22E3
                                                        • _free.LIBCMT ref: 007F22F4
                                                        • _free.LIBCMT ref: 007F2305
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _free$ErrorFreeHeapLast
                                                        • String ID:
                                                        • API String ID: 776569668-0
                                                        • Opcode ID: a053191d2170143411ca281ee17f3c04803022c0f7929e7c9d1c13586ae210da
                                                        • Instruction ID: b09b7e83b4da207c761f31d64458a099ffb1cf29526ffe48f95ba08b8d7f3a2b
                                                        • Opcode Fuzzy Hash: a053191d2170143411ca281ee17f3c04803022c0f7929e7c9d1c13586ae210da
                                                        • Instruction Fuzzy Hash: 3FF05E71884126CF8A12FF98BC098283B64FB18760709051BF514E73BACB781912AFE4
                                                        APIs
                                                        • EndPath.GDI32(?), ref: 007D95D4
                                                        • StrokeAndFillPath.GDI32(?,?,008171F7,00000000,?,?,?), ref: 007D95F0
                                                        • SelectObject.GDI32(?,00000000), ref: 007D9603
                                                        • DeleteObject.GDI32 ref: 007D9616
                                                        • StrokePath.GDI32(?), ref: 007D9631
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectStroke$DeleteFillSelect
                                                        • String ID:
                                                        • API String ID: 2625713937-0
                                                        • Opcode ID: 0cda37a1c8c9d015bd3f06d78e705aea3f876c1ac1016f7e6cdf57e3a815b092
                                                        • Instruction ID: 27402454472b09c5f3559e180611679818d6faa00f35da472488d6414ebf786c
                                                        • Opcode Fuzzy Hash: 0cda37a1c8c9d015bd3f06d78e705aea3f876c1ac1016f7e6cdf57e3a815b092
                                                        • Instruction Fuzzy Hash: 4FF01930009705EFDB126F65ED1C7A43F71BB00362F488216F525551F0D73989A1DF20
                                                        APIs
                                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0082187F
                                                        • CloseHandle.KERNEL32(?), ref: 00821894
                                                        • CloseHandle.KERNEL32(?), ref: 0082189C
                                                        • GetProcessHeap.KERNEL32(00000000,?), ref: 008218A5
                                                        • HeapFree.KERNEL32(00000000), ref: 008218AC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleHeap$FreeObjectProcessSingleWait
                                                        • String ID:
                                                        • API String ID: 3751786701-0
                                                        • Opcode ID: 6f8fdc14ca60018c1ee99ba8199211915442a9eabac216039539bddc0b275cd2
                                                        • Instruction ID: ed697d00b4ccd78f69ababa5262be49e41ad9417f1c5cd0380e70bdb782557e0
                                                        • Opcode Fuzzy Hash: 6f8fdc14ca60018c1ee99ba8199211915442a9eabac216039539bddc0b275cd2
                                                        • Instruction Fuzzy Hash: C9E0C236044705BFDA015BA5ED0C94ABB69FB49B22B908220F22681570CB36A4A0DF50
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: __freea$_free
                                                        • String ID: a/p$am/pm
                                                        • API String ID: 3432400110-3206640213
                                                        • Opcode ID: 1d7ae476ff71016067041c16f9a02aa4ffafda2fc4de4797d6ed169b27533bc6
                                                        • Instruction ID: 22b0d142463c0148510520220dc809f79f6fb38a8bdacde15bd3e6d93c48ddd7
                                                        • Opcode Fuzzy Hash: 1d7ae476ff71016067041c16f9a02aa4ffafda2fc4de4797d6ed169b27533bc6
                                                        • Instruction Fuzzy Hash: 31D1F231A1020ECADB289F68C855BFAB7B1FF06310FA84159EB11AB751D77D9D80CB91
                                                        APIs
                                                          • Part of subcall function 007C7620: _wcslen.LIBCMT ref: 007C7625
                                                          • Part of subcall function 007C6B57: _wcslen.LIBCMT ref: 007C6B6A
                                                        • _wcslen.LIBCMT ref: 00839506
                                                        • _wcslen.LIBCMT ref: 0083952D
                                                        • 7523D1A0.COMDLG32(00000058), ref: 00839585
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$7523
                                                        • String ID: X
                                                        • API String ID: 1414850397-3081909835
                                                        • Opcode ID: 99c04813d985071be962bd58b6d0960557be17bbc1eb2daf3b4fe3c02c12c255
                                                        • Instruction ID: 35e41e0421134ae870bef4a11cf93c82e201c3e807e16c8c31cef6d249249b5a
                                                        • Opcode Fuzzy Hash: 99c04813d985071be962bd58b6d0960557be17bbc1eb2daf3b4fe3c02c12c255
                                                        • Instruction Fuzzy Hash: 14E16B71608340DFC724EF24C885A6AB7E0FF84314F04896DE9999B3A2DB75ED45CB92
                                                        APIs
                                                          • Part of subcall function 007E0242: RtlEnterCriticalSection.NTDLL(0089070C), ref: 007E024D
                                                          • Part of subcall function 007E0242: RtlLeaveCriticalSection.NTDLL(0089070C), ref: 007E028A
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                          • Part of subcall function 007E00A3: __onexit.LIBCMT ref: 007E00A9
                                                        • __Init_thread_footer.LIBCMT ref: 00847BFB
                                                          • Part of subcall function 007E01F8: RtlEnterCriticalSection.NTDLL(0089070C), ref: 007E0202
                                                          • Part of subcall function 007E01F8: RtlLeaveCriticalSection.NTDLL(0089070C), ref: 007E0235
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                        • String ID: 5$G$Variable must be of type 'Object'.
                                                        • API String ID: 535116098-3733170431
                                                        • Opcode ID: b43375b9cfa059ae41a5b08bf8a18fe02f770ddb516119162dec4de99963dd39
                                                        • Instruction ID: ef7cd21b62c6156295a73a82e1d2203ad2e6033f106e0a7586cc0ac66c968948
                                                        • Opcode Fuzzy Hash: b43375b9cfa059ae41a5b08bf8a18fe02f770ddb516119162dec4de99963dd39
                                                        • Instruction Fuzzy Hash: AE915674A0420DEFCB14EF98D895EADB7B2FF48304F148059F806AB292DB75AE45CB51
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: JO|
                                                        • API String ID: 0-2887696345
                                                        • Opcode ID: da214a9845865a79e57d21e2c12ceae0c728f570d0631f369fd87d4b4c08297e
                                                        • Instruction ID: a67a72bab9d489e23be8fca55af7aeadfa73f7c8e4f6e39d7b836146dfa1bf57
                                                        • Opcode Fuzzy Hash: da214a9845865a79e57d21e2c12ceae0c728f570d0631f369fd87d4b4c08297e
                                                        • Instruction Fuzzy Hash: 7A518EB1901A0EEFCB11AFA5C849ABE7BB8BF49310F14015AF705A7391D7799A01CB61
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 007F8B6E
                                                        • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 007F8B7A
                                                        • __dosmaperr.LIBCMT ref: 007F8B81
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                        • String ID: .~
                                                        • API String ID: 2434981716-505086709
                                                        • Opcode ID: 06c9cedee000b3643ffa922ffe08edd86ed2f58d1ddb415cddddf5bc1c4b05b8
                                                        • Instruction ID: 53e013105071bac08744e369e43c686731152807fdb14b0ebaf3739e80d320f7
                                                        • Opcode Fuzzy Hash: 06c9cedee000b3643ffa922ffe08edd86ed2f58d1ddb415cddddf5bc1c4b05b8
                                                        • Instruction Fuzzy Hash: 65419FF160414DAFCB659F24DC85A7D7FA5EB85300F2C819AFA548B742DE39CD028751
                                                        APIs
                                                          • Part of subcall function 0082B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008221D0,?,?,00000034,00000800,?,00000034), ref: 0082B42D
                                                        • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00822760
                                                          • Part of subcall function 0082B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,008221FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0082B3F8
                                                          • Part of subcall function 0082B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0082B355
                                                          • Part of subcall function 0082B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00822194,00000034,?,?,00001004,00000000,00000000), ref: 0082B365
                                                          • Part of subcall function 0082B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00822194,00000034,?,?,00001004,00000000,00000000), ref: 0082B37B
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 008227CD
                                                        • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0082281A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                        • String ID: @
                                                        • API String ID: 4150878124-2766056989
                                                        • Opcode ID: 537734bcbd890846e3fb703cbd10248cc1bd5cb9bb2d841982b1a5c78724e1f1
                                                        • Instruction ID: 52a7d83939bb32342cd8a9e66307ccdbe18699a006442b9dfa788c57945e0e7c
                                                        • Opcode Fuzzy Hash: 537734bcbd890846e3fb703cbd10248cc1bd5cb9bb2d841982b1a5c78724e1f1
                                                        • Instruction Fuzzy Hash: 1B411D72901228BFDB10DBA8DD85ADEBBB8FF09700F104099FA55B7181DB706E85CB61
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\tN8GsMV1le.exe,00000104), ref: 007F1769
                                                        • _free.LIBCMT ref: 007F1834
                                                        • _free.LIBCMT ref: 007F183E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _free$FileModuleName
                                                        • String ID: C:\Users\user\Desktop\tN8GsMV1le.exe
                                                        • API String ID: 2506810119-296164394
                                                        • Opcode ID: e37fe49537fac19dcb975639e2008a42ca2ed98eed218bed614219c97bd8f844
                                                        • Instruction ID: 5b4b43f379e86c97f901c489aafd69bf65d0d70809f80cc8920109a4eadae799
                                                        • Opcode Fuzzy Hash: e37fe49537fac19dcb975639e2008a42ca2ed98eed218bed614219c97bd8f844
                                                        • Instruction Fuzzy Hash: 92319D71A0420CEFCB21EB999989DAEBBFCEB85360F544166EA0497311D6748A40CBA0
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0082C306
                                                        • DeleteMenu.USER32(?,00000007,00000000), ref: 0082C34C
                                                        • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00891990,01513990), ref: 0082C395
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Menu$Delete$InfoItem
                                                        • String ID: 0
                                                        • API String ID: 135850232-4108050209
                                                        • Opcode ID: 3c046e6a37e4dd0f631699c06c813209673b0c1ce5af2ccdf63861f92b755cde
                                                        • Instruction ID: 128aece3e6d6ece3a6cf61edda215c54705176c0038d0b54b4e41d7889d0eb3d
                                                        • Opcode Fuzzy Hash: 3c046e6a37e4dd0f631699c06c813209673b0c1ce5af2ccdf63861f92b755cde
                                                        • Instruction Fuzzy Hash: F0418B31204351AFD720DF29E888B6EBBA8FF85324F008A1DE9A5D7391D734A944CB52
                                                        APIs
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0085CC08,00000000,?,?,?,?), ref: 008544AA
                                                        • GetWindowLongW.USER32 ref: 008544C7
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 008544D7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID: SysTreeView32
                                                        • API String ID: 847901565-1698111956
                                                        • Opcode ID: 7b68cad5e425434258f72db2135e4b73d5e7b86a56e03699d86456a2615fbd19
                                                        • Instruction ID: 355c2fb02c6827ded6fd2ec976502b933cd69d373269591bfa9f7dae780935e3
                                                        • Opcode Fuzzy Hash: 7b68cad5e425434258f72db2135e4b73d5e7b86a56e03699d86456a2615fbd19
                                                        • Instruction Fuzzy Hash: 63318B31240205AFDF209E38DC45BEA7BA9FB08329F205319F979E22D0D774EC949B50
                                                        APIs
                                                          • Part of subcall function 0084335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00843077,?,?), ref: 00843378
                                                        • inet_addr.WS2_32(?), ref: 0084307A
                                                        • _wcslen.LIBCMT ref: 0084309B
                                                        • htons.WS2_32(00000000), ref: 00843106
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                        • String ID: 255.255.255.255
                                                        • API String ID: 946324512-2422070025
                                                        • Opcode ID: 715877caf87a71aaa952da913aecb81102c06a572b446a5a0e957f66a3cb6e93
                                                        • Instruction ID: d9dbc7e93298c3ee8366971cbf3525f9d85876962c6f796028eeb9b8cf52437a
                                                        • Opcode Fuzzy Hash: 715877caf87a71aaa952da913aecb81102c06a572b446a5a0e957f66a3cb6e93
                                                        • Instruction Fuzzy Hash: CE31E435200209DFDB10CF68C485EAA77E0FF14318F248199E915DB392DB76EE45CB60
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00854705
                                                        • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00854713
                                                        • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0085471A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$DestroyWindow
                                                        • String ID: msctls_updown32
                                                        • API String ID: 4014797782-2298589950
                                                        • Opcode ID: c8196ba334c455552098e150af1f54643bbb000433f063c12b92c3c1a8c64714
                                                        • Instruction ID: aae452a5ebf7ed9e473ab555d490c1b27bd4e8ecd5b36888bfe76eea4101807d
                                                        • Opcode Fuzzy Hash: c8196ba334c455552098e150af1f54643bbb000433f063c12b92c3c1a8c64714
                                                        • Instruction Fuzzy Hash: 97218CB5604209AFEB11DF68DCC5DA737EDFB5A3A9B041049FA01DB291CB30EC55CA60
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                        • API String ID: 176396367-2734436370
                                                        • Opcode ID: 82607a9482cb9557e82240882f2a68ee690c8cf3c9761b97f68a78a8e298981f
                                                        • Instruction ID: 31c2173baf76b92fe582a649a8e87ad42954119a2430a85f95d74732c5b524b4
                                                        • Opcode Fuzzy Hash: 82607a9482cb9557e82240882f2a68ee690c8cf3c9761b97f68a78a8e298981f
                                                        • Instruction Fuzzy Hash: 0F213832204530A6D331AA25AD06FB773D8FF65314F10402AF9DAD7182EB59AD85C2A6
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00853840
                                                        • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00853850
                                                        • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00853876
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$MoveWindow
                                                        • String ID: Listbox
                                                        • API String ID: 3315199576-2633736733
                                                        • Opcode ID: b55cf22dea26d95d0ec8678349f5891e6237ec98eda1694b4690ccea49e323a9
                                                        • Instruction ID: f4d366058e3a799d404ed15193cc4b30c15f20a512c77937d136f299ba489a18
                                                        • Opcode Fuzzy Hash: b55cf22dea26d95d0ec8678349f5891e6237ec98eda1694b4690ccea49e323a9
                                                        • Instruction Fuzzy Hash: 2921CF72600218BBEF219FA4CC85FBB376EFF89791F108124F910AB190C675DC568BA0
                                                        APIs
                                                        • SetErrorMode.KERNEL32(00000001), ref: 00834A08
                                                        • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00834A5C
                                                        • SetErrorMode.KERNEL32(00000000,?,?,0085CC08), ref: 00834AD0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorMode$InformationVolume
                                                        • String ID: %lu
                                                        • API String ID: 2507767853-685833217
                                                        • Opcode ID: 4552c212d5536f7d783289ab1ccb54bc4f5ac5666de207f134e842e3ea34a98b
                                                        • Instruction ID: 12c3b554e7d51a88f234f2c714a43583ea733e0c2bdbebdce204673cb5744fb0
                                                        • Opcode Fuzzy Hash: 4552c212d5536f7d783289ab1ccb54bc4f5ac5666de207f134e842e3ea34a98b
                                                        • Instruction Fuzzy Hash: 75312F75A00219AFDB10DF64C885EAA7BF8FF44308F144099F905DB252DB75ED45CBA1
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0085424F
                                                        • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00854264
                                                        • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00854271
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: msctls_trackbar32
                                                        • API String ID: 3850602802-1010561917
                                                        • Opcode ID: e4a16bb6fe39a6c711659c991ee998de3da4701e9820099438fd145db8a76c04
                                                        • Instruction ID: db852f0bed99de2bb0af5f6253555947620930a5ebab7396c8542192b94dbeab
                                                        • Opcode Fuzzy Hash: e4a16bb6fe39a6c711659c991ee998de3da4701e9820099438fd145db8a76c04
                                                        • Instruction Fuzzy Hash: 0011E331240208BEEF205E29CC46FAB3BACFF95B59F110128FA55E2090D271D8519B20
                                                        APIs
                                                          • Part of subcall function 007C6B57: _wcslen.LIBCMT ref: 007C6B6A
                                                          • Part of subcall function 00822DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00822DC5
                                                          • Part of subcall function 00822DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00822DD6
                                                          • Part of subcall function 00822DA7: GetCurrentThreadId.KERNEL32 ref: 00822DDD
                                                          • Part of subcall function 00822DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00822DE4
                                                        • GetFocus.USER32 ref: 00822F78
                                                          • Part of subcall function 00822DEE: GetParent.USER32(00000000), ref: 00822DF9
                                                        • GetClassNameW.USER32(?,?,00000100), ref: 00822FC3
                                                        • EnumChildWindows.USER32(?,0082303B), ref: 00822FEB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                        • String ID: %s%d
                                                        • API String ID: 1272988791-1110647743
                                                        • Opcode ID: d6b353ed4bbe74df5d29c7011d60f4c7b01ac30b13f6066384692d3eb19a621e
                                                        • Instruction ID: 28e1b67a8f1a6981317948b519559db1e2a9e772bf88d565a7704fa514e255f7
                                                        • Opcode Fuzzy Hash: d6b353ed4bbe74df5d29c7011d60f4c7b01ac30b13f6066384692d3eb19a621e
                                                        • Instruction Fuzzy Hash: 0A11C3B1200219ABCF00BF749C95EED37AAFF94304F044079B909DB252DE385E898B70
                                                        APIs
                                                        • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008558C1
                                                        • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 008558EE
                                                        • DrawMenuBar.USER32(?), ref: 008558FD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Menu$InfoItem$Draw
                                                        • String ID: 0
                                                        • API String ID: 3227129158-4108050209
                                                        • Opcode ID: a70b4c57075a96941aa0c50b4b49a4285ae23c3ed8c37c7d1205988a91a3ecce
                                                        • Instruction ID: b52ef3680a142ca8e605d10eb1fc9acf687747e4c1f485f275cf3ae79e1bd4ef
                                                        • Opcode Fuzzy Hash: a70b4c57075a96941aa0c50b4b49a4285ae23c3ed8c37c7d1205988a91a3ecce
                                                        • Instruction Fuzzy Hash: B9018431500218EFDB119F51EC44BAEBFB5FF45362F108099E849D6261DB348A84DF71
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 4c1ba45a9a6bcafaabb07d66c7de0194aae1644734704b8a8a26d689d5317f57
                                                        • Instruction ID: 7d64030a5e0f8e819c4666b7c5538d55c01e897be25b79c729ded36bdeedeccd
                                                        • Opcode Fuzzy Hash: 4c1ba45a9a6bcafaabb07d66c7de0194aae1644734704b8a8a26d689d5317f57
                                                        • Instruction Fuzzy Hash: 7BC14C75A0021AEFDB14CF94D898AAEB7B5FF48704F108599E905EB252D731ED81CF90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Variant$ClearInitInitializeUninitialize
                                                        • String ID:
                                                        • API String ID: 1998397398-0
                                                        • Opcode ID: 806040d8b64e84088ac06326b0e4392242fbec41444812291ed22d393b76e6f8
                                                        • Instruction ID: 4f440d179eb729dfa824147b5150c142c5a8045f8e4f3a0985fd8b0a94028689
                                                        • Opcode Fuzzy Hash: 806040d8b64e84088ac06326b0e4392242fbec41444812291ed22d393b76e6f8
                                                        • Instruction Fuzzy Hash: 08A103756042059FCB14DF28C489A2AB7E5FF88714F05885DF98A9B362DB34EE01DB92
                                                        APIs
                                                        • ProgIDFromCLSID.COMBASE(?,00000000), ref: 008205F0
                                                        • CoTaskMemFree.COMBASE(00000000), ref: 00820608
                                                        • CLSIDFromProgID.COMBASE(?,?), ref: 0082062D
                                                        • _memcmp.LIBVCRUNTIME ref: 0082064E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: FromProg$FreeTask_memcmp
                                                        • String ID:
                                                        • API String ID: 314563124-0
                                                        • Opcode ID: a21c0440c85a7b0988360b0d3ddd6d69a9f0e16abf0c51d44d02d62ca49e50bf
                                                        • Instruction ID: 53fe8ba2a88d9ca97c8c23a092149137d7bf719d110a2073ea032cb953b959e3
                                                        • Opcode Fuzzy Hash: a21c0440c85a7b0988360b0d3ddd6d69a9f0e16abf0c51d44d02d62ca49e50bf
                                                        • Instruction Fuzzy Hash: 07810771A00219EFCB04DF94C988EEEB7B9FF89315B204558E506EB251DB71AE46CF60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _free
                                                        • String ID:
                                                        • API String ID: 269201875-0
                                                        • Opcode ID: b5c7c581c81944569cd5854931deb426504f951b8cc5dabd844ca1dacf481562
                                                        • Instruction ID: e570cc2bcf11f84f34dfc4d93e27ae780fd6d88acad25d6668cca0c23b74ed56
                                                        • Opcode Fuzzy Hash: b5c7c581c81944569cd5854931deb426504f951b8cc5dabd844ca1dacf481562
                                                        • Instruction Fuzzy Hash: 94415D32600948EBDF616FBD8C8D6BE3AAAFF45330F144225F618D72E2E73848415766
                                                        APIs
                                                        • GetWindowRect.USER32(0151E558,?), ref: 008562E2
                                                        • ScreenToClient.USER32(?,?), ref: 00856315
                                                        • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00856382
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$ClientMoveRectScreen
                                                        • String ID:
                                                        • API String ID: 3880355969-0
                                                        • Opcode ID: 7c7a7ca3302acaf76b3745099a3f4269ae9807294e8283ba0e73cf8ae33a4167
                                                        • Instruction ID: 1be255b0b380951854d75fb57ba03486aa54f5ad3581d8347083bc47885e72d3
                                                        • Opcode Fuzzy Hash: 7c7a7ca3302acaf76b3745099a3f4269ae9807294e8283ba0e73cf8ae33a4167
                                                        • Instruction Fuzzy Hash: BB513A74A00209EFCF10DF68D884AAE7BB6FB45365F508169F815DB2A0E730ED95CB50
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fb5fa1af4f0bddc5b69b3c690a3e106c13dead4a2a29c2c2a590fae8327b4119
                                                        • Instruction ID: 413225fe76d7a2a60b8d8c35c765c48d7531b05ebcc46b1e472430f4e3de0cfb
                                                        • Opcode Fuzzy Hash: fb5fa1af4f0bddc5b69b3c690a3e106c13dead4a2a29c2c2a590fae8327b4119
                                                        • Instruction Fuzzy Hash: 63412B75900748FFD7249F78CC45B7E7BA9EB88710F10452AF251DB782D779A9018B90
                                                        APIs
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00835783
                                                        • GetLastError.KERNEL32(?,00000000), ref: 008357A9
                                                        • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 008357CE
                                                        • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 008357FA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                        • String ID:
                                                        • API String ID: 3321077145-0
                                                        • Opcode ID: d42aea1653731cf36e8290a7d3d9f463790272587744dca777eed589b1e8ae32
                                                        • Instruction ID: ba814c03e74319007079451c990c9fb31dfbc9b915675602eac088d0dd1be42a
                                                        • Opcode Fuzzy Hash: d42aea1653731cf36e8290a7d3d9f463790272587744dca777eed589b1e8ae32
                                                        • Instruction Fuzzy Hash: 7D410735600610DFCB15DF15D445A5ABBE2FF89320B18889CE84AAB362CB38FD41DF91
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(?,00000000,?,007E6D71,00000000,00000000,007E82D9,?,007E82D9,?,00000001,007E6D71,?,00000001,007E82D9,007E82D9), ref: 007FD910
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007FD999
                                                        • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 007FD9AB
                                                        • __freea.LIBCMT ref: 007FD9B4
                                                          • Part of subcall function 007F3820: RtlAllocateHeap.NTDLL(00000000,?,00891444), ref: 007F3852
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                        • String ID:
                                                        • API String ID: 2652629310-0
                                                        • Opcode ID: 4bcb5c6cb6de51fe7ba2c6927e3370973df0d8acb46dd037493df8300425fe2f
                                                        • Instruction ID: a67935a3ce5eb81ecab97033b5f7cf2dfe53a34acc22a89c0e193ae56958b834
                                                        • Opcode Fuzzy Hash: 4bcb5c6cb6de51fe7ba2c6927e3370973df0d8acb46dd037493df8300425fe2f
                                                        • Instruction Fuzzy Hash: 2F31CF72A0020AABDF25DFA9DC45EBE7BA6EB40310F054168FD04D7251EB79ED50CBA0
                                                        APIs
                                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00855352
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00855375
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00855382
                                                        • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 008553A8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$InvalidateMessageRectSend
                                                        • String ID:
                                                        • API String ID: 3340791633-0
                                                        • Opcode ID: 2c50d99ed814273fa30d42a3b093c1984075b7da759e951f273ec42e5eef5ce9
                                                        • Instruction ID: e8cd6899bd0ab7a2b5b42fc489343332621e904d830cd5821d90f3efa52701f0
                                                        • Opcode Fuzzy Hash: 2c50d99ed814273fa30d42a3b093c1984075b7da759e951f273ec42e5eef5ce9
                                                        • Instruction Fuzzy Hash: BE31C134A55A0CEFEF209F14CC25BE977A2FB06392F584016BE19D63E0C7B499889B41
                                                        APIs
                                                        • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 0082ABF1
                                                        • SetKeyboardState.USER32(00000080,?,00008000), ref: 0082AC0D
                                                        • PostMessageW.USER32(00000000,00000101,00000000), ref: 0082AC74
                                                        • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 0082ACC6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: KeyboardState$InputMessagePostSend
                                                        • String ID:
                                                        • API String ID: 432972143-0
                                                        • Opcode ID: 991fefb9558f6b69e8864a085315d1eb05e0034dfecd813a4c965c7aea39001e
                                                        • Instruction ID: 24052af6ce448196f9b2b067141f0039d0165826be30b34962ea66a05c7ec4cc
                                                        • Opcode Fuzzy Hash: 991fefb9558f6b69e8864a085315d1eb05e0034dfecd813a4c965c7aea39001e
                                                        • Instruction Fuzzy Hash: 5931F430A04728AFFF298B65EC047FA7BAAFF89310F04421AE485D21D1D3798AC58752
                                                        APIs
                                                        • ClientToScreen.USER32(?,?), ref: 0085769A
                                                        • GetWindowRect.USER32(?,?), ref: 00857710
                                                        • PtInRect.USER32(?,?,00858B89), ref: 00857720
                                                        • MessageBeep.USER32(00000000), ref: 0085778C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                        • String ID:
                                                        • API String ID: 1352109105-0
                                                        • Opcode ID: 1f2948ca9719b7853ec5893925d5bf984f78b400f7dd8e76d685caa8fc001746
                                                        • Instruction ID: 609ccaca42d67f0bf5e93689ede672ed168918dbdd3e20146ad2731dc25f36d6
                                                        • Opcode Fuzzy Hash: 1f2948ca9719b7853ec5893925d5bf984f78b400f7dd8e76d685caa8fc001746
                                                        • Instruction Fuzzy Hash: 2641AD34609255DFDB02DF58E898EA9BBF5FB49306F1880A9E814DB261C330A949CF90
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 008516EB
                                                          • Part of subcall function 00823A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00823A57
                                                          • Part of subcall function 00823A3D: GetCurrentThreadId.KERNEL32 ref: 00823A5E
                                                          • Part of subcall function 00823A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,008225B3), ref: 00823A65
                                                        • GetCaretPos.USER32(?), ref: 008516FF
                                                        • ClientToScreen.USER32(00000000,?), ref: 0085174C
                                                        • GetForegroundWindow.USER32 ref: 00851752
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                        • String ID:
                                                        • API String ID: 2759813231-0
                                                        • Opcode ID: bd90f8576d1621080a877ecc4c4e748e0ef8e788becbd5af2b5298600297dffd
                                                        • Instruction ID: 04a69b51a870e35e28ef122b794e44ddc43f43ff39989d8b4204309de9d7ab0d
                                                        • Opcode Fuzzy Hash: bd90f8576d1621080a877ecc4c4e748e0ef8e788becbd5af2b5298600297dffd
                                                        • Instruction Fuzzy Hash: 6F313E75D00249AFCB04EFA9C885DAEBBF9FF48304B5480AEE415E7211DA359E45CBA1
                                                        APIs
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0082D501
                                                        • Process32FirstW.KERNEL32(00000000,?), ref: 0082D50F
                                                        • Process32NextW.KERNEL32(00000000,?), ref: 0082D52F
                                                        • CloseHandle.KERNEL32(00000000), ref: 0082D5DC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                        • String ID:
                                                        • API String ID: 420147892-0
                                                        • Opcode ID: 82054c3542f46efef9f5a11e796070392653c0ea5d869bb4b600581de3e4be3d
                                                        • Instruction ID: 363e3dbc7e331407a2c147332b07faf7918c82c9a16b48b469cfed429637e90d
                                                        • Opcode Fuzzy Hash: 82054c3542f46efef9f5a11e796070392653c0ea5d869bb4b600581de3e4be3d
                                                        • Instruction Fuzzy Hash: 2D317E711083009FD301EF64D889EAFBBF8FF99354F14092DF581861A1EB75A985CBA2
                                                        APIs
                                                        • GetFileAttributesW.KERNEL32(?,0085CB68), ref: 0082D2FB
                                                        • GetLastError.KERNEL32 ref: 0082D30A
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 0082D319
                                                        • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0085CB68), ref: 0082D376
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$AttributesErrorFileLast
                                                        • String ID:
                                                        • API String ID: 2267087916-0
                                                        • Opcode ID: 33e8878ae4be46efdb8d99daa479445a8e724d9492cd337a06551e5c2bc5bb09
                                                        • Instruction ID: a6d9573114525e602ebcbe2a594d8c9e3847fd7d23cea738501b5e990c48854e
                                                        • Opcode Fuzzy Hash: 33e8878ae4be46efdb8d99daa479445a8e724d9492cd337a06551e5c2bc5bb09
                                                        • Instruction Fuzzy Hash: 39219F70508311DF8700DF28D8898AABBE4FE56324F504A1DF4A9C33A1E734D98ACB93
                                                        APIs
                                                          • Part of subcall function 00821014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0082102A
                                                          • Part of subcall function 00821014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00821036
                                                          • Part of subcall function 00821014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00821045
                                                          • Part of subcall function 00821014: RtlAllocateHeap.NTDLL(00000000,?,TokenIntegrityLevel), ref: 0082104C
                                                          • Part of subcall function 00821014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00821062
                                                        • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 008215BE
                                                        • _memcmp.LIBVCRUNTIME ref: 008215E1
                                                        • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00821617
                                                        • HeapFree.KERNEL32(00000000), ref: 0082161E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Heap$InformationProcessToken$AllocateErrorFreeLastLookupPrivilegeValue_memcmp
                                                        • String ID:
                                                        • API String ID: 2182266621-0
                                                        • Opcode ID: 11bf09595ec9e03b67b6cc3d67939dad841457bc89335d38b2f36455a6e38c4d
                                                        • Instruction ID: 548ca70d21ef131f97330c38f53191bb6600d5ac9cf41f4a68769964a0992021
                                                        • Opcode Fuzzy Hash: 11bf09595ec9e03b67b6cc3d67939dad841457bc89335d38b2f36455a6e38c4d
                                                        • Instruction Fuzzy Hash: D5215771E40218AFDF00DFA4D949BEEB7B8FF64355F284459E441AB241E734AA85CBA0
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000EC), ref: 0085280A
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00852824
                                                        • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00852832
                                                        • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00852840
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$Long$AttributesLayered
                                                        • String ID:
                                                        • API String ID: 2169480361-0
                                                        • Opcode ID: b53609bdb560a92956cd3d9d03cc3b316df14cf7c640ca1fd43213b845e37026
                                                        • Instruction ID: 135b8702c580bfc6f1af81fd9ca0debe89e4ddeaa441b78b99176e347ebab15a
                                                        • Opcode Fuzzy Hash: b53609bdb560a92956cd3d9d03cc3b316df14cf7c640ca1fd43213b845e37026
                                                        • Instruction Fuzzy Hash: A621E031204211AFD715DB24C845FAA7B95FF4A326F14825CF826CB2E2CB75EC86CB90
                                                        APIs
                                                          • Part of subcall function 00828D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0082790A,?,000000FF,?,00828754,00000000,?,0000001C,?,?), ref: 00828D8C
                                                          • Part of subcall function 00828D7D: lstrcpyW.KERNEL32(00000000,?,?,0082790A,?,000000FF,?,00828754,00000000,?,0000001C,?,?,00000000), ref: 00828DB2
                                                          • Part of subcall function 00828D7D: lstrcmpiW.KERNEL32(00000000,?,0082790A,?,000000FF,?,00828754,00000000,?,0000001C,?,?), ref: 00828DE3
                                                        • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00828754,00000000,?,0000001C,?,?,00000000), ref: 00827923
                                                        • lstrcpyW.KERNEL32(00000000,?,?,00828754,00000000,?,0000001C,?,?,00000000), ref: 00827949
                                                        • lstrcmpiW.KERNEL32(00000002,cdecl,?,00828754,00000000,?,0000001C,?,?,00000000), ref: 00827984
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: lstrcmpilstrcpylstrlen
                                                        • String ID: cdecl
                                                        • API String ID: 4031866154-3896280584
                                                        • Opcode ID: affb5f606d4ce02cd3aaf556f7e78e3bbbf39e24003e3ae971103e591893e653
                                                        • Instruction ID: 4cc5b1b5e32f759570d65d661da070cf690511eb82e05ad73b72eff9e56fb58e
                                                        • Opcode Fuzzy Hash: affb5f606d4ce02cd3aaf556f7e78e3bbbf39e24003e3ae971103e591893e653
                                                        • Instruction Fuzzy Hash: 7111E93A200311AFCB155F39E845D7A7BA9FF45354B50402AF946C73A4EB359891C761
                                                        APIs
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00857D0B
                                                        • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00857D2A
                                                        • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00857D42
                                                        • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0083B7AD,00000000), ref: 00857D6B
                                                          • Part of subcall function 007D9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 007D9BB2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$Long
                                                        • String ID:
                                                        • API String ID: 847901565-0
                                                        • Opcode ID: 29f16de3eb94c9bb900f0b231cf287ea3ce600ce1b4e9cd865cbf041b7f5d40e
                                                        • Instruction ID: f0f9018e7c997cd12c22e31e2df93de26678e26fd412caddc2f7743dda57f0fa
                                                        • Opcode Fuzzy Hash: 29f16de3eb94c9bb900f0b231cf287ea3ce600ce1b4e9cd865cbf041b7f5d40e
                                                        • Instruction Fuzzy Hash: F511C031208615AFCB119F68DC08A663BA5FF45362B158325FC35D72F0E7319D58CB40
                                                        APIs
                                                        • SendMessageW.USER32(?,00001060,?,00000004), ref: 008556BB
                                                        • _wcslen.LIBCMT ref: 008556CD
                                                        • _wcslen.LIBCMT ref: 008556D8
                                                        • SendMessageW.USER32(?,00001002,00000000,?), ref: 00855816
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend_wcslen
                                                        • String ID:
                                                        • API String ID: 455545452-0
                                                        • Opcode ID: e30a79a35be292e8237882c49a82506f22a3ba703430d72d5a24d931fdfb661a
                                                        • Instruction ID: 80497c34372689ac38e4326afe80b6442c9c87ac5399206bfb02d56bc2cf8b68
                                                        • Opcode Fuzzy Hash: e30a79a35be292e8237882c49a82506f22a3ba703430d72d5a24d931fdfb661a
                                                        • Instruction Fuzzy Hash: 78110375600608E6DF209FA1DC95AEE3BBCFF10766B10402AFD15E6081E774DA88CF64
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 008214FF
                                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00821506
                                                        • CloseHandle.KERNEL32(00000004), ref: 00821520
                                                        • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0082154F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Process$CloseCreateCurrentHandleLogonOpenTokenWith
                                                        • String ID:
                                                        • API String ID: 2621361867-0
                                                        • Opcode ID: 5451372b3118de1686bd800bab08465259aed05bf198d302f985ff9cabc0125f
                                                        • Instruction ID: c351abba588df93283ff7ce8143043d5209ab53554e2641ff34bd23c3dc7500b
                                                        • Opcode Fuzzy Hash: 5451372b3118de1686bd800bab08465259aed05bf198d302f985ff9cabc0125f
                                                        • Instruction Fuzzy Hash: 9D11597250030DAFDF118F98EE49BDE7BA9FF48705F144055FA05A2160C3758EA0DB60
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 194832ff5efd9076562af2ccd368e6a386a4f53a3c9e1d91898e526e4ac907d1
                                                        • Instruction ID: 29c6ff9fcc1fb595059bcf3d7e687bb26dd0a1592f650bccda71a47bba365e93
                                                        • Opcode Fuzzy Hash: 194832ff5efd9076562af2ccd368e6a386a4f53a3c9e1d91898e526e4ac907d1
                                                        • Instruction Fuzzy Hash: FB018BB2319A1EBEF62126786CC4F37662DEF413B8F750329F721A13D2DB689C005660
                                                        APIs
                                                        • SendMessageW.USER32(?,000000B0,?,?), ref: 00821A47
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00821A59
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00821A6F
                                                        • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00821A8A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID:
                                                        • API String ID: 3850602802-0
                                                        • Opcode ID: 012da72f200f9bf224f970f9dd1878b903616105602654dd20fd819a93dc95a5
                                                        • Instruction ID: 3ffa6e1ff2079fc697f31343067d5e5f9579d6a7540f9d3ea07929b0e88bffdc
                                                        • Opcode Fuzzy Hash: 012da72f200f9bf224f970f9dd1878b903616105602654dd20fd819a93dc95a5
                                                        • Instruction Fuzzy Hash: 4411273A901229FFEF109BA4C985FADBB78FB18750F2000A1EA01B7290D7716E50DB94
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 0082E1FD
                                                        • MessageBoxW.USER32(?,?,?,?), ref: 0082E230
                                                        • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0082E246
                                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0082E24D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                        • String ID:
                                                        • API String ID: 2880819207-0
                                                        • Opcode ID: 316a44e6096717b84bf5cc66827918ef1a64143ec1915203cd7204a4afc3a186
                                                        • Instruction ID: 018cd9a0417559ca4fcb9066f1fe4e6784fbd834559024f2f95850d4f93fd64c
                                                        • Opcode Fuzzy Hash: 316a44e6096717b84bf5cc66827918ef1a64143ec1915203cd7204a4afc3a186
                                                        • Instruction Fuzzy Hash: A211C876904369FFCB019FA8AC09A9E7FACFB45311F144256F925E3391D7788D448BA0
                                                        APIs
                                                        • CreateThread.KERNEL32(00000000,?,007ECFF9,00000000,00000004,00000000), ref: 007ED218
                                                        • GetLastError.KERNEL32 ref: 007ED224
                                                        • __dosmaperr.LIBCMT ref: 007ED22B
                                                        • ResumeThread.KERNEL32(00000000), ref: 007ED249
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                        • String ID:
                                                        • API String ID: 173952441-0
                                                        • Opcode ID: ecb72ffcaba6a0084995e957d87dcbd38a3c3bfdf587210f562755fbe667050c
                                                        • Instruction ID: 05dfce3369ded3d257633fa17cbe80c208fd1aa6d83d913b8147c74408f35b40
                                                        • Opcode Fuzzy Hash: ecb72ffcaba6a0084995e957d87dcbd38a3c3bfdf587210f562755fbe667050c
                                                        • Instruction Fuzzy Hash: C501D636807248BFC7215BA7DC09BAE7A6DFF89731F104219FA25961D0DB798D01C6A1
                                                        APIs
                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 007C604C
                                                        • GetStockObject.GDI32(00000011), ref: 007C6060
                                                        • SendMessageW.USER32(00000000,00000030,00000000), ref: 007C606A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CreateMessageObjectSendStockWindow
                                                        • String ID:
                                                        • API String ID: 3970641297-0
                                                        • Opcode ID: 258b484dc80b37fff443c0149232558a5f0dc52f5abd0e21c627a19bd228206c
                                                        • Instruction ID: bf4baeca850e2db19c7020c8150d29feeee5a47227792aba920921385075aa40
                                                        • Opcode Fuzzy Hash: 258b484dc80b37fff443c0149232558a5f0dc52f5abd0e21c627a19bd228206c
                                                        • Instruction Fuzzy Hash: F7115E72501609BFEF125F949C84FEA7BA9FF18755F050119FA1562110D73A9CA09F90
                                                        APIs
                                                        • ___BuildCatchObject.LIBVCRUNTIME ref: 007E3B56
                                                          • Part of subcall function 007E3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 007E3AD2
                                                          • Part of subcall function 007E3AA3: ___AdjustPointer.LIBCMT ref: 007E3AED
                                                        • _UnwindNestedFrames.LIBCMT ref: 007E3B6B
                                                        • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 007E3B7C
                                                        • CallCatchBlock.LIBVCRUNTIME ref: 007E3BA4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                        • String ID:
                                                        • API String ID: 737400349-0
                                                        • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                        • Instruction ID: 4b22b94fcf7a57680e310593f851e22bec77f6833764d96f381c090a273ea2aa
                                                        • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                        • Instruction Fuzzy Hash: 04012972101189BBDF126E96CC4AEEB3B6EEF8C754F044014FE4896121C73AE961DBA0
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,007C13C6,00000000,00000000,?,007F301A,007C13C6,00000000,00000000,00000000,?,007F328B,00000006,FlsSetValue), ref: 007F30A5
                                                        • GetLastError.KERNEL32(?,007F301A,007C13C6,00000000,00000000,00000000,?,007F328B,00000006,FlsSetValue,00862290,FlsSetValue,00000000,00000364,?,007F2E46), ref: 007F30B1
                                                        • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,007F301A,007C13C6,00000000,00000000,00000000,?,007F328B,00000006,FlsSetValue,00862290,FlsSetValue,00000000), ref: 007F30BF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad$ErrorLast
                                                        • String ID:
                                                        • API String ID: 3177248105-0
                                                        • Opcode ID: 759bf9fbc23ee342007876943f9aa64ef946c5ff1bd791a5f275f9fedff6b5ae
                                                        • Instruction ID: 543377cf383ee4bbef506858192cd46cd8d86d67dcf1b289f34dc980345c7c89
                                                        • Opcode Fuzzy Hash: 759bf9fbc23ee342007876943f9aa64ef946c5ff1bd791a5f275f9fedff6b5ae
                                                        • Instruction Fuzzy Hash: 1D01D43230132AAFCB214A799C449777B9AAF05BA1B210721FA06E3340CF29D941CAE0
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0082747F
                                                        • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00827497
                                                        • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 008274AC
                                                        • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 008274CA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Type$Register$FileLoadModuleNameUser
                                                        • String ID:
                                                        • API String ID: 1352324309-0
                                                        • Opcode ID: f28ae5105384577044e8e08f0e292d5cfa37e63f0e16f7aef19c06d6115554d8
                                                        • Instruction ID: 73266e8d6abfd8105bf035138071218a265140cfb0f16e048aab876064ed12d0
                                                        • Opcode Fuzzy Hash: f28ae5105384577044e8e08f0e292d5cfa37e63f0e16f7aef19c06d6115554d8
                                                        • Instruction Fuzzy Hash: 7811ADB1205325AFE720AF15EC08FA27BFCFB00B04F508569E616D6191D7B4E984DFA5
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0082ACD3,?,00008000), ref: 0082B0C4
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0082ACD3,?,00008000), ref: 0082B0E9
                                                        • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0082ACD3,?,00008000), ref: 0082B0F3
                                                        • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0082ACD3,?,00008000), ref: 0082B126
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CounterPerformanceQuerySleep
                                                        • String ID:
                                                        • API String ID: 2875609808-0
                                                        • Opcode ID: e836b0a1da72951e91dc024a30b3f3502ce77d8c6ef12fa0579bc7fb5447cae1
                                                        • Instruction ID: e6fbef56875121e685d5b8f0d59841209ee78f8a7e869b2d9bec725b244dde7c
                                                        • Opcode Fuzzy Hash: e836b0a1da72951e91dc024a30b3f3502ce77d8c6ef12fa0579bc7fb5447cae1
                                                        • Instruction Fuzzy Hash: A5112D31D02A3DEBCF00AFE4E9696EEBF78FF49711F114096D941B2281DB3456A08B55
                                                        APIs
                                                        • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00822DC5
                                                        • GetWindowThreadProcessId.USER32(?,00000000), ref: 00822DD6
                                                        • GetCurrentThreadId.KERNEL32 ref: 00822DDD
                                                        • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00822DE4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                        • String ID:
                                                        • API String ID: 2710830443-0
                                                        • Opcode ID: f858f8caeb5752bcbab7b192152ccd47b3756abdb8063a448125556b885a0808
                                                        • Instruction ID: 477537475445f521050b83ab4d334cc21b933026ce8d26cc5d7fa530c3fdea8a
                                                        • Opcode Fuzzy Hash: f858f8caeb5752bcbab7b192152ccd47b3756abdb8063a448125556b885a0808
                                                        • Instruction Fuzzy Hash: F3E0EDB25417387BD7201B72AC0DEEB7EACFB56BA2F400119B506D50909AA99985CAB0
                                                        APIs
                                                          • Part of subcall function 007D9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 007D9693
                                                          • Part of subcall function 007D9639: SelectObject.GDI32(?,00000000), ref: 007D96A2
                                                          • Part of subcall function 007D9639: BeginPath.GDI32(?), ref: 007D96B9
                                                          • Part of subcall function 007D9639: SelectObject.GDI32(?,00000000), ref: 007D96E2
                                                        • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00858887
                                                        • LineTo.GDI32(?,?,?), ref: 00858894
                                                        • EndPath.GDI32(?), ref: 008588A4
                                                        • StrokePath.GDI32(?), ref: 008588B2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                        • String ID:
                                                        • API String ID: 1539411459-0
                                                        • Opcode ID: 95c932b87889642c742b5852a2e0d59e2f37f9db97db3cbd9ab53f0c33376d43
                                                        • Instruction ID: ed4f286f9a576607ed99eeb52b5f6515cbd4af09861fd418e9a0b2801560340e
                                                        • Opcode Fuzzy Hash: 95c932b87889642c742b5852a2e0d59e2f37f9db97db3cbd9ab53f0c33376d43
                                                        • Instruction Fuzzy Hash: 87F03A36045759FADB126F94AC0DFCA3F69BF06312F448001FA11650E1C7795511CFA5
                                                        APIs
                                                        • GetSysColor.USER32(00000008), ref: 007D98CC
                                                        • SetTextColor.GDI32(?,?), ref: 007D98D6
                                                        • SetBkMode.GDI32(?,00000001), ref: 007D98E9
                                                        • GetStockObject.GDI32(00000005), ref: 007D98F1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Color$ModeObjectStockText
                                                        • String ID:
                                                        • API String ID: 4037423528-0
                                                        • Opcode ID: b2ea3a2d1f04728c0bf0e07ec02e3e165b07bf5013e640b0df696f2988626d6c
                                                        • Instruction ID: 7e2710584abb0d55fa5ae400ea544202b6c31c0081ea8e9773e00c1863a5a7e3
                                                        • Opcode Fuzzy Hash: b2ea3a2d1f04728c0bf0e07ec02e3e165b07bf5013e640b0df696f2988626d6c
                                                        • Instruction Fuzzy Hash: 66E06D31284780AEDB215B78AC09BE83F21FB12376F04821AF7FA980E1C77546809F10
                                                        APIs
                                                        • GetCurrentThread.KERNEL32 ref: 00821634
                                                        • OpenThreadToken.ADVAPI32(00000000,?,?,?,008211D9), ref: 0082163B
                                                        • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,008211D9), ref: 00821648
                                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,008211D9), ref: 0082164F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CurrentOpenProcessThreadToken
                                                        • String ID:
                                                        • API String ID: 3974789173-0
                                                        • Opcode ID: b05583b22f4c9b77825b204d794dc10d236082f3d2d2e4d56931853df6cc2b89
                                                        • Instruction ID: 307ab00bd70c5e323d683c531c37d37db62ddfe5b4deb5a23c80e6c7f17b0977
                                                        • Opcode Fuzzy Hash: b05583b22f4c9b77825b204d794dc10d236082f3d2d2e4d56931853df6cc2b89
                                                        • Instruction Fuzzy Hash: 95E04F71602321AFDB201BA1AD0DB8A3B68FF64B93F144808F245C9080D6284480CB50
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 0081D858
                                                        • GetDC.USER32(00000000), ref: 0081D862
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0081D882
                                                        • ReleaseDC.USER32(?), ref: 0081D8A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: 7bf3ef87bec68182e1b71a50ff79d75dd981dcd467a9f7802ca5bddda9499244
                                                        • Instruction ID: 2122ce86a743e8bf9fdece4e4af494ba75e061e3ad753030cbb76c33171f4755
                                                        • Opcode Fuzzy Hash: 7bf3ef87bec68182e1b71a50ff79d75dd981dcd467a9f7802ca5bddda9499244
                                                        • Instruction Fuzzy Hash: BDE075B5800305DFCB519FA09908A6DBBF5FB58712B14945DE84AE7250D73C5A41AF50
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 0081D86C
                                                        • GetDC.USER32(00000000), ref: 0081D876
                                                        • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0081D882
                                                        • ReleaseDC.USER32(?), ref: 0081D8A3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                        • String ID:
                                                        • API String ID: 2889604237-0
                                                        • Opcode ID: bd8877638c4adb6d765363706edddf2d4cdc1a99285ab24e85f0f475a6a50c14
                                                        • Instruction ID: 2bf02e4f3862b3768e6e047bc2f1dda6218a5b5b0eef81d18ef1f5dd985acdc5
                                                        • Opcode Fuzzy Hash: bd8877638c4adb6d765363706edddf2d4cdc1a99285ab24e85f0f475a6a50c14
                                                        • Instruction Fuzzy Hash: D6E07EB5800304EFCB51AFA09808A6DBBF5BB58712B14944DE94AE7250DB3C5A02AF50
                                                        APIs
                                                          • Part of subcall function 007C7620: _wcslen.LIBCMT ref: 007C7625
                                                        • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00834ED4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Connection_wcslen
                                                        • String ID: *$LPT
                                                        • API String ID: 1725874428-3443410124
                                                        • Opcode ID: 3e2613104bfd19f2f876e415b742945530c958f7aed59dedecc91e11e913a893
                                                        • Instruction ID: b555e8cce4bbf901e78aaf014cbc8ac07a03759b4e0a8da3e3a5d23bc8641b6e
                                                        • Opcode Fuzzy Hash: 3e2613104bfd19f2f876e415b742945530c958f7aed59dedecc91e11e913a893
                                                        • Instruction Fuzzy Hash: 0C912C75A002049FCB14DF58C484EA9BBF1FF85318F19909DE80A9B362DB75ED85CB91
                                                        APIs
                                                        • OleSetContainedObject.OLE32(?,00000001), ref: 00824F4B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ContainedObject
                                                        • String ID: AutoIt3GUI$Container
                                                        • API String ID: 3565006973-3941886329
                                                        • Opcode ID: 99bc0357579a695734be9e2d0fe0a2f76b71dd23dfeb49daff4ac1763c994124
                                                        • Instruction ID: 70a72f3a2bf0bac33af58f7c9e040237ee01ebe54c07df111b01052b87367c72
                                                        • Opcode Fuzzy Hash: 99bc0357579a695734be9e2d0fe0a2f76b71dd23dfeb49daff4ac1763c994124
                                                        • Instruction Fuzzy Hash: F6815A70200611AFDB14DF58C988A6ABBF5FF48705F14856EF94ADB391DBB0E885CB60
                                                        APIs
                                                        • __startOneArgErrorHandling.LIBCMT ref: 007EE30D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ErrorHandling__start
                                                        • String ID: pow
                                                        • API String ID: 3213639722-2276729525
                                                        • Opcode ID: 20578f5d99fdeabebcb6fc66edadaa1caa4a7bc3de4be22c8e628955f87e1117
                                                        • Instruction ID: a060e99bbe2bcb9fc0b03818c9fdbe75295246ca01e3dd15cb22ce4ef06166b0
                                                        • Opcode Fuzzy Hash: 20578f5d99fdeabebcb6fc66edadaa1caa4a7bc3de4be22c8e628955f87e1117
                                                        • Instruction Fuzzy Hash: 7E51AA61A0E64AD6CB197B15CD4537A3BA8FB04740F348DA9E1D1823E9EF3C8C91DA46
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: #
                                                        • API String ID: 0-1885708031
                                                        • Opcode ID: 0a32950f684ffef6c87a801c03f75b359ba74b615ce7146d533a0a2c9d381b8a
                                                        • Instruction ID: 772344bc0c62f28b86ca473b75b27b020ce0def21ce891dc3f94981b1c906211
                                                        • Opcode Fuzzy Hash: 0a32950f684ffef6c87a801c03f75b359ba74b615ce7146d533a0a2c9d381b8a
                                                        • Instruction Fuzzy Hash: 2C510575500246DFEB15EF68C485AFA7BB8FF55310F24445AEC51DB2D0D638AD82CB60
                                                        APIs
                                                        • Sleep.KERNEL32(00000000), ref: 007DF2A2
                                                        • GlobalMemoryStatusEx.KERNEL32(?), ref: 007DF2BB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: GlobalMemorySleepStatus
                                                        • String ID: @
                                                        • API String ID: 2783356886-2766056989
                                                        • Opcode ID: a7ac83ec1c52984d5779f432e963321da4062a325cd31bc5841e2d363baa2082
                                                        • Instruction ID: fe45713c5ce83b088f56652ad8fc277741686fbd8f7ce28d526c79908076813b
                                                        • Opcode Fuzzy Hash: a7ac83ec1c52984d5779f432e963321da4062a325cd31bc5841e2d363baa2082
                                                        • Instruction Fuzzy Hash: 22513472418B44DBD320AF14DC8ABAFBBF8FB84300F81885DF1D9411A5EB749569CB66
                                                        APIs
                                                        • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 008457E0
                                                        • _wcslen.LIBCMT ref: 008457EC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: BuffCharUpper_wcslen
                                                        • String ID: CALLARGARRAY
                                                        • API String ID: 157775604-1150593374
                                                        • Opcode ID: 1b044a732704c55a654c59641aaff8219b466840bbfbbb9ec51f458c2096137f
                                                        • Instruction ID: 297a8777ea2817bfb68b8d590d36ccaac18637679dd9595992486654a1096234
                                                        • Opcode Fuzzy Hash: 1b044a732704c55a654c59641aaff8219b466840bbfbbb9ec51f458c2096137f
                                                        • Instruction Fuzzy Hash: FB418C31A00209DFCB14EFA9C8859AEBBF5FF59724F10406DE505E7292EB349D81CBA0
                                                        APIs
                                                        • _wcslen.LIBCMT ref: 0083D130
                                                        • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0083D13A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CrackInternet_wcslen
                                                        • String ID: |
                                                        • API String ID: 596671847-2343686810
                                                        • Opcode ID: 8a9004c4755ebb8979f6058b248dc07d22a82c1982950593acaf02811e7c635f
                                                        • Instruction ID: 84f4ff75506f875dd1ea11bb9cbd01811996f87c3ad7c900411dfbc86baacfec
                                                        • Opcode Fuzzy Hash: 8a9004c4755ebb8979f6058b248dc07d22a82c1982950593acaf02811e7c635f
                                                        • Instruction Fuzzy Hash: EB310771D00209EBCF15EFA5DC89EEEBFB9FF48304F000019E815A6162E735AA16CB90
                                                        APIs
                                                        • DestroyWindow.USER32(?,?,?,?), ref: 00853621
                                                        • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0085365C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$DestroyMove
                                                        • String ID: static
                                                        • API String ID: 2139405536-2160076837
                                                        • Opcode ID: c7db4c5e1c7a0e3f4ace31f92bece90854e6e2a1ba88ee7bdeceb027634b00f1
                                                        • Instruction ID: 26884efd8344ab539a03b7ea5944164997849e0272dc4ec7ef48d4fc8361d5da
                                                        • Opcode Fuzzy Hash: c7db4c5e1c7a0e3f4ace31f92bece90854e6e2a1ba88ee7bdeceb027634b00f1
                                                        • Instruction Fuzzy Hash: DE318C71100604AEDB109F28DC80EBB73A9FF98765F10961DF8A5D7290DA34AD85DB60
                                                        APIs
                                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0085461F
                                                        • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00854634
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: '
                                                        • API String ID: 3850602802-1997036262
                                                        • Opcode ID: 60a34ef5cc03cd5f44f9f39cd30c5c475384b64a470a45c3c543652b5f6e5cfb
                                                        • Instruction ID: 8640ab8ef240325ee068772c0b57b8e17c92c57ae515d44e8dc0dc719c1c9e5a
                                                        • Opcode Fuzzy Hash: 60a34ef5cc03cd5f44f9f39cd30c5c475384b64a470a45c3c543652b5f6e5cfb
                                                        • Instruction Fuzzy Hash: 76311774A0120AAFDB14CF69C990BDABBB5FB09305F14506AED04EB341E770A985CF90
                                                        APIs
                                                        • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0085327C
                                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00853287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: MessageSend
                                                        • String ID: Combobox
                                                        • API String ID: 3850602802-2096851135
                                                        • Opcode ID: 3012a9e9997bf34d44aa7a65d7f79c2d5e754ca4ec40bae30a0f4a24cfb4e3cc
                                                        • Instruction ID: 729a6476a825ee1a17a9968382750055ac57c62786effabe0b7d3114b4c140a9
                                                        • Opcode Fuzzy Hash: 3012a9e9997bf34d44aa7a65d7f79c2d5e754ca4ec40bae30a0f4a24cfb4e3cc
                                                        • Instruction Fuzzy Hash: A811B271304608BFEF219E54DC84EBB376BFB943A6F104129F918E7290D6359D558760
                                                        APIs
                                                          • Part of subcall function 007C600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 007C604C
                                                          • Part of subcall function 007C600E: GetStockObject.GDI32(00000011), ref: 007C6060
                                                          • Part of subcall function 007C600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 007C606A
                                                        • GetWindowRect.USER32(00000000,?), ref: 0085377A
                                                        • GetSysColor.USER32(00000012), ref: 00853794
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                        • String ID: static
                                                        • API String ID: 1983116058-2160076837
                                                        • Opcode ID: 83a36eddb9aac5877f76159b075679f79b69bd36b248a4a0f3f9ed343fde70b8
                                                        • Instruction ID: 12d96dc54db6a9f0dc585e2ff54b6851160c6bc5635c5782badf5c66614fc2eb
                                                        • Opcode Fuzzy Hash: 83a36eddb9aac5877f76159b075679f79b69bd36b248a4a0f3f9ed343fde70b8
                                                        • Instruction Fuzzy Hash: 111129B2A10209AFDF00DFA8CC45EFA7BB8FB08355F004529FD55E2250E735E9559B50
                                                        APIs
                                                        • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0083CD7D
                                                        • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0083CDA6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Internet$OpenOption
                                                        • String ID: <local>
                                                        • API String ID: 942729171-4266983199
                                                        • Opcode ID: aa9b9971f1ad64919247c7d658229d5488b80ed0e015264fe50d49e4817c9565
                                                        • Instruction ID: 147cb812547f45733ec3c67fbb91f46c71496bd83cbc33cecd65152e3f14633e
                                                        • Opcode Fuzzy Hash: aa9b9971f1ad64919247c7d658229d5488b80ed0e015264fe50d49e4817c9565
                                                        • Instruction Fuzzy Hash: 6411C275205635BED7385B668C49EE7BEADFF927A8F00422AB109E3180D7749840D7F0
                                                        APIs
                                                        • GetWindowTextLengthW.USER32(00000000), ref: 008534AB
                                                        • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 008534BA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: LengthMessageSendTextWindow
                                                        • String ID: edit
                                                        • API String ID: 2978978980-2167791130
                                                        • Opcode ID: 1177f9945a4cb55f82c0977bad86ff1692f563bea0903a007d0a83fd338b8416
                                                        • Instruction ID: a8ec8437b6e24e2803c080bce1997bd73bfc4e16f49eeb51c66cc9d73698b3c1
                                                        • Opcode Fuzzy Hash: 1177f9945a4cb55f82c0977bad86ff1692f563bea0903a007d0a83fd338b8416
                                                        • Instruction Fuzzy Hash: D2119D71100208AFEF114E64DC44AAB376AFB243B9F504724FD61D31D0C735DD999B58
                                                        APIs
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                        • CharUpperBuffW.USER32(?,?,?), ref: 00826CB6
                                                        • _wcslen.LIBCMT ref: 00826CC2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen$BuffCharUpper
                                                        • String ID: STOP
                                                        • API String ID: 1256254125-2411985666
                                                        • Opcode ID: aea1e0ed5ac7fa77c0652a84447b8979d3feb9fdddb04006ef819f4af36a5f71
                                                        • Instruction ID: 443125ecc5327234e48ad606cc77d49bde52ab192c8e15886d4a116dc820cd51
                                                        • Opcode Fuzzy Hash: aea1e0ed5ac7fa77c0652a84447b8979d3feb9fdddb04006ef819f4af36a5f71
                                                        • Instruction Fuzzy Hash: 89010032A0053A8BCB20AFFDEC849BF73E4FB607147400528E862D3190FA36D9A0C650
                                                        APIs
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                          • Part of subcall function 00823CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00823CCA
                                                        • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00821D4C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: 015119a57bab5076e69786d69c4d09ffec15de2c5a459177cf33405be9f666da
                                                        • Instruction ID: acbd12aa05ac1d6b35c5df17118d523f500d00ab5a457c7ebcc161206cafeddd
                                                        • Opcode Fuzzy Hash: 015119a57bab5076e69786d69c4d09ffec15de2c5a459177cf33405be9f666da
                                                        • Instruction Fuzzy Hash: C401B575601228EBCF54EBA4EC59DFE77A8FB66350B14051DF832A73C1EA3459488760
                                                        APIs
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                          • Part of subcall function 00823CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00823CCA
                                                        • SendMessageW.USER32(?,00000180,00000000,?), ref: 00821C46
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: f7d663ccd4849e7fdf2661e396ea12ac245af9600405c79cd48af0ecc7f0da4a
                                                        • Instruction ID: 8d97e4c39c49792fa1dd8f984982b21953e40f0fd0ef146881a3764089269cff
                                                        • Opcode Fuzzy Hash: f7d663ccd4849e7fdf2661e396ea12ac245af9600405c79cd48af0ecc7f0da4a
                                                        • Instruction Fuzzy Hash: C901AC75641118A6CF14FBA0D959EFF77E8FB31340F14001DA916B7281EA289F5887B1
                                                        APIs
                                                          • Part of subcall function 007C9CB3: _wcslen.LIBCMT ref: 007C9CBD
                                                          • Part of subcall function 00823CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00823CCA
                                                        • SendMessageW.USER32(?,00000182,?,00000000), ref: 00821CC8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ClassMessageNameSend_wcslen
                                                        • String ID: ComboBox$ListBox
                                                        • API String ID: 624084870-1403004172
                                                        • Opcode ID: cb4fc01c7c8478e3fb74cd40590cf7de5031c9b50779dfa0affeb2777da97cb3
                                                        • Instruction ID: 3d63aa1b108c68fc5c3ab7ae6744be395a5c79e39fa0caf8a81952c70bf8f9bc
                                                        • Opcode Fuzzy Hash: cb4fc01c7c8478e3fb74cd40590cf7de5031c9b50779dfa0affeb2777da97cb3
                                                        • Instruction Fuzzy Hash: 06016775641128A6CF14FBA4DA19EFE77E8FB21340B64001DB911F3281EA699F588771
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: _wcslen
                                                        • String ID: 3, 3, 16, 1
                                                        • API String ID: 176396367-3042988571
                                                        • Opcode ID: 9e6789c4df23bd860134a427fa3d340e76f753d04e6cb31080daee3226bda644
                                                        • Instruction ID: 00d55c2b66d4230e393962a9223cce3db8ef2cc7c8245b6b70377638fbc87928
                                                        • Opcode Fuzzy Hash: 9e6789c4df23bd860134a427fa3d340e76f753d04e6cb31080daee3226bda644
                                                        • Instruction Fuzzy Hash: A4E02B42205260609231227A9CC597F5789EFDD750710182BF981D2267EB98DD9193F5
                                                        APIs
                                                        • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00820B23
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Message
                                                        • String ID: AutoIt$Error allocating memory.
                                                        • API String ID: 2030045667-4017498283
                                                        • Opcode ID: ac184e5a2a3a550b18203966a7e5a8fe84001482a972acdf05551205f92e8131
                                                        • Instruction ID: 3d2f66299078dc686590fc344f3244d226fdff7accff9dbf809e6420f4cbc081
                                                        • Opcode Fuzzy Hash: ac184e5a2a3a550b18203966a7e5a8fe84001482a972acdf05551205f92e8131
                                                        • Instruction Fuzzy Hash: 88E0D8312443186ED21036957C0BF897F94EF09F61F10046BFB98D56C38AE928904AE9
                                                        APIs
                                                          • Part of subcall function 007DF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(00890A88,00000000,00890A74,007E0D71,?,?,?,007C100A), ref: 007DF7CE
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,007C100A), ref: 007E0D75
                                                        • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,007C100A), ref: 007E0D84
                                                        Strings
                                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 007E0D7F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                        • API String ID: 55579361-631824599
                                                        • Opcode ID: d3d6c6765fef715615ceb604ffbbb37a16fc3c0d2da8640bf1458557b328ecae
                                                        • Instruction ID: 0036ca8fd212bd09689b395a5af908993533146ef0fbad24d1cfbb0848676cb9
                                                        • Opcode Fuzzy Hash: d3d6c6765fef715615ceb604ffbbb37a16fc3c0d2da8640bf1458557b328ecae
                                                        • Instruction Fuzzy Hash: 40E039742003418BD320AFA9D8487467BE0BB04756F00492DE882CA652DBF8E4888BE1
                                                        APIs
                                                        • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0083302F
                                                        • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00833044
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: Temp$FileNamePath
                                                        • String ID: aut
                                                        • API String ID: 3285503233-3010740371
                                                        • Opcode ID: b65a86947dcca7bd0ad053875919d661ff12d1bde9fc5c50fa58fdf04fef556d
                                                        • Instruction ID: 98e58a1145cb6b1606809b517cf45f24df94bf0d7320a8b3f47ecbb33bf51f69
                                                        • Opcode Fuzzy Hash: b65a86947dcca7bd0ad053875919d661ff12d1bde9fc5c50fa58fdf04fef556d
                                                        • Instruction Fuzzy Hash: C9D05E765003286BDA30A7A4AC4EFCB3B6CEB04751F0002A1B655E2091EAB89984CFD0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: LocalTime
                                                        • String ID: %.3d$X64
                                                        • API String ID: 481472006-1077770165
                                                        • Opcode ID: e625a9d04a2b230b19980cd4d3c6d7d92aa5014bf608326178f50f6855b0e3b6
                                                        • Instruction ID: d63547bdff0160e4fe89bb17e897f72241467a58c9e3b795673c680c6f15385e
                                                        • Opcode Fuzzy Hash: e625a9d04a2b230b19980cd4d3c6d7d92aa5014bf608326178f50f6855b0e3b6
                                                        • Instruction Fuzzy Hash: B9D012A180831CE9CB5096E0CC49AF9B37CFF19305F608453F826D1140D63CE9886B61
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0085232C
                                                        • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0085233F
                                                          • Part of subcall function 0082E97B: Sleep.KERNEL32 ref: 0082E9F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 685b92d40226fb0dbd32b15cfd7944dc2815ef9903bc58227c504fe8f131d39d
                                                        • Instruction ID: 130bd091dcdfb62f1cc70c64e59a1e4b116a5e3fdbbd94a29f60472ba0349ff3
                                                        • Opcode Fuzzy Hash: 685b92d40226fb0dbd32b15cfd7944dc2815ef9903bc58227c504fe8f131d39d
                                                        • Instruction Fuzzy Hash: FCD0A932380310BAE2A4B770AC1FFC66A04BB00B01F004A067205EA1D0D8A8A8418A44
                                                        APIs
                                                        • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0085236C
                                                        • PostMessageW.USER32(00000000), ref: 00852373
                                                          • Part of subcall function 0082E97B: Sleep.KERNEL32 ref: 0082E9F3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: FindMessagePostSleepWindow
                                                        • String ID: Shell_TrayWnd
                                                        • API String ID: 529655941-2988720461
                                                        • Opcode ID: 277f9fd82da595071ca0769d738333ac62bb1d3060e880f40fcc39aed8d202e5
                                                        • Instruction ID: 22ea5ccbd88cc356f63a1a5a9610c0acc21afb50a5c48046be8a367c77a4febf
                                                        • Opcode Fuzzy Hash: 277f9fd82da595071ca0769d738333ac62bb1d3060e880f40fcc39aed8d202e5
                                                        • Instruction Fuzzy Hash: 2BD0A9323803107AE2A4B770AC0FFC66A04BB00B01F004A067201EA1D0D8A8A8418A48
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 007FBE93
                                                        • GetLastError.KERNEL32 ref: 007FBEA1
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 007FBEFC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1740122961.00000000007C1000.00000040.00000001.01000000.00000003.sdmp, Offset: 007C0000, based on PE: true
                                                        • Associated: 00000000.00000002.1740098164.00000000007C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.0000000000882000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000088C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.000000000089C000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740122961.00000000008E4000.00000040.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740648152.00000000008EA000.00000080.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1740682303.00000000008EB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7c0000_tN8GsMV1le.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorLast
                                                        • String ID:
                                                        • API String ID: 1717984340-0
                                                        • Opcode ID: 77e2208cd9a11b475014227fe4451e8599156747b0457ec6b3201ec7815b9f3c
                                                        • Instruction ID: e5c26a6c2c74baa128d4fef73abc30e204b5a3684a30d56416a15e0b6e9984eb
                                                        • Opcode Fuzzy Hash: 77e2208cd9a11b475014227fe4451e8599156747b0457ec6b3201ec7815b9f3c
                                                        • Instruction Fuzzy Hash: E241F53560120AEFCF218FA5CC84ABA7BE5EF45320F144169FA59973A1DB388D00DB61